NIRT SOC Analyst

Overview

Remote
Depends on Experience
Contract - W2
Contract - Independent
Contract - 5 Year(s)
No Travel Required

Skills

Computer Networking
Computer Science
Firewall
Information Security
Intrusion Detection
Load Balancing
SIEM
Network
Security Operations
Network Protocols
TCP/IP
Unstructured Data
Encryption

Job Details

NIRT SOC Analyst - Junior/Mid

Location: Remote
Eastern, Central and Mountain time zones.
This position requires the ability to obtain and maintain a U.S. government Public Trust clearance; therefore, U.S. citizenship is required in accordance with the client s federal agency eligibility standards.

In accordance with Public Trust background investigation guidelines, candidates must have resided within the United States for at least the past five years. Extended travel or residence outside the United States totaling more than six months during the past five years (excluding official military service) may affect eligibility.

Target Rate (Fully burdened): $8000 to 8600/ Month c2c/1099

Description:
This role will work with the National Incident and Response Team (NIRT) of the Federal Reserve System as a Security Operations Center (SOC) Analyst. This candidate will review data and help identify anomalies that require further investigation. The candidate will work (3) 12-hour shifts a week on consecutive days (though days may shift to ensure team coverage from time to time). Day or Night shift has yet to be determined. This resource will generally be on duty with one other resource from the NIRT during their shift.

Typical Duties:
BS 0-2 Years or HS 6-8.
Bachelor's degree in Computer Science or a related discipline (preferred) and experience in security aspects of multiple platforms, operating systems, software, communications and network protocols or an equivalent combination of education and work experience.
Ability to obtain and maintain National Security Clearance, including ship.
Security platform and technology capabilities; SIEM utilization skills with the ability to analyze security events from multiple monitoring and logging sources to identify and/or confirm suspicious activity.
Ability to analyze large data sets and unstructured data to identify trends and anomalies indicative of malicious activity.
Knowledge of, and experience with, TCP/IP protocol and network/packet analysis.
Knowledge of current security threats, techniques, and landscape, and a dedicated desire to research current information security landscape.
Perform security event triage and analysis with knowledge in current security threats and techniques.
Respond to different attack vectors such as data exfiltration, DDoS, malware, insider risk, and phishing.

Experience with IT Infrastructure designs, technologies, products, and services. This should include knowledge of networking protocols, firewall functionality, host and network intrusion detection systems, operating systems, databases, encryption, load balancing, and other technologies

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.