SOC Analyst

Overview

On Site
Contract - Independent
Contract - W2
Contract - To Hire

Skills

Scripting
Operations
DOD
Python
Shell Scripting
Mentoring
Cissp
Incident Response
IPS
IDS
Wireshark
Splunk
SIEM
TS/SCI
SOC
Network Protocols
Snort

Job Details

Job Title: SOC Analyst
Location: Arlington, VA (5 days onsite and 2nd shift 2 pm 10 pm)
Duration: Contract to Hire

Citizenship: with active Top Secret clearance

Top skills:

Candidates need an Active TS and must be willing/eligible to upgrade to a TS/SCI
Must have a DoD 8140 Certification (A+, Network+, Security+, CEH, CISSP, etc.) or higher
Looking for 2-3 years of Tier 2 support and 3-5+ years of overall experience. They ideally want someone with a Bachelor's degree, but are willing to be flexible if they have more experience
Really needs someone who understands Incident Response, the MITRE ATT&CK frameworks, Splunk, PCAP, log review, and understands the various alerts and how to respond to them.


Work Schedule
This position works 8-hour shifts on business days, with occasional on-call support for weekends as needed (frequency and expectations to be discussed during the interview process)
Required Qualifications

Leadership:
2+ years' Experience mentoring or providing technical guidance to junior NSOC analysts, or leading incident response efforts.
Education:
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent experience).
Experience:
3-6 years of experience in a SOC or cybersecurity operations role, with proven experience investigating and responding to security incidents
Technical Skills:
Proficiency with SIEM platforms (e.g., Splunk) and endpoint detection tools (e.g., CrowdStrike, Sentinel One, Microsoft Defender).
Strong understanding of network protocols, packet analysis, and tools like Wireshark or Zeek.
Experience with IDS/IPS/NDR/EDR tools (e.g., Snort, Suricata, Bricata).
Ability to analyze logs, correlate data, and detect adversary tactics, techniques, and procedures (TTPs).
Familiarity with threat intelligence frameworks such as MITRE ATT&CK, Cyber Kill Chain, and IOC analysis.
Basic scripting or automation skills (e.g., Python, PowerShell, Bash) to enhance workflows.
Certifications:
DoD 8140 Cyber Incident Responder Certification (Security+, CySA+, or equivalent) required.
Thanks and Regards,
Murali Sharma


Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.