Job Title: Senior SOC Analyst (Incident Response & Threat Detection)
Role Type: 12 + months contract – good chance of extensions
Location: Washington, DC
Work Model: Hybrid – 1 day onsite per week (remote is also possible with a waiver)
Clearance Requirement: Ability to obtain a Public Trust clearance
We are seeking an experienced Senior SOC Analyst to support advanced security operations, incident response, and threat detection activities within a mature SOC environment. This role is ideal for a hands-on cybersecurity professional with deep expertise in incident response, SIEM engineering, threat analysis, and malware investigation. The Senior SOC Analyst will play a key role in identifying, analyzing, and responding to complex cyber threats while helping strengthen detection capabilities and mentoring junior analysts.
Key Responsibilities
- Provide advanced technical expertise in incident response, network defense, and security monitoring within a SOC environment.
- Perform cyber threat analysis, including threat actor tracking, detection campaigns, and analysis of tactics, techniques, and procedures (TTPs).
- Design and develop custom SIEM content, including rules, filters, signatures, dashboards, and scripts to enhance detection and response.
- Monitor, triage, and respond to security alerts, escalating incidents as appropriate and ensuring thorough documentation.
- Collect and analyze large data sets such as PCAP, NetFlow, and log data to identify anomalous or malicious activity.
- Support threat hunting activities and assist with continuous improvement of SOC detection capabilities.
- Conduct static and dynamic malware analysis, including reverse engineering binaries when required.
- Develop and maintain automation and operational tooling using Bash, PowerShell, or Python.
- Provide guidance and informal mentoring to junior SOC analysts and contribute to knowledge sharing across the team.
Required Qualifications- 7+ years of professional experience in incident response, cyber threat analysis, and information security.
- 5+ years of hands-on experience in host-based and network security monitoring within a SOC environment.
- Strong experience with SIEM platforms (e.g., Splunk or similar), including creation of custom detection content.
- Advanced knowledge of network traffic analysis, malware analysis techniques, and security monitoring tools.
- Proficiency in at least one scripting language: Bash, PowerShell, or Python.
- Strong understanding of advanced persistent threats (APTs) and emerging cyber threat trends.
- Excellent documentation, technical writing, and incident reporting skills.
- Strong verbal communication skills, including the ability to provide ad-hoc training or knowledge transfer.
- Ability to obtain a Public Trust clearance.
Certifications- One or more of the following (or equivalent IAT Level III certifications):
- GCIA, GCIH, GCFA, GCED
- CASP+, CCNP Security, CISA, CCSP
- Active CISSP or ability to obtain CISSP within 6 months of starting the role.
System One, and its subsidiaries including Joulé and Mountain Ltd., are leaders in delivering outsourced services and workforce solutions across North America. We help clients get work done more efficiently and economically, without compromising quality. System One not only serves as a valued partner for our clients, but we offer eligible employees health and welfare benefits coverage options including medical, dental, vision, spending accounts, life insurance, voluntary plans, as well as participation in a 401(k) plan.
System One is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, age, national origin, disability, family care or medical leave status, genetic information, veteran status, marital status, or any other characteristic protected by applicable federal, state, or local law.
#M-2
#LI-CB5
Ref: #851-Rockville-S1