Overview
On Site
USD 135,000.00 - 155,000.00 per year
Full Time
Skills
Project Management
Performance Management
Preventive Maintenance
Security Operations
Cloud Computing
IOC
Continuous Monitoring
Root Cause Analysis
Standard Operating Procedure
Management
Training
Workflow
Educate
Reporting
Visualization
Incident Management
Cyber Security
SIEM
IBM QRadar
Splunk
IDS
IPS
Vulnerability Management
Mentorship
Network
Research
Analytical Skill
CISSP
CISM
Certified Ethical Hacker
Leadership
Communication
Problem Solving
Conflict Resolution
Computer Architecture
Operating Systems
Encryption
SLA
Forensics
Malware Analysis
Orchestration
Scripting
Python
Windows PowerShell
System On A Chip
Threat Analysis
SAP BASIS
Law
FOCUS
Job Details
Job Description
ECS is seeking a Senior SOC Analyst/Lead to work remotely .
ECS is seeking a Senior SOC Analyst (SOC Lead) with demonstrated experience supporting the development of processes, procedures, and automations to rapidly ingest, aggregate, correlate, normalize, analyze event messages to absurdly identify and respond to Indicators of Compromise (IoCs). The ideal candidate is a critical thinker and perpetual learner who is excited to solve some of our clients' toughest challenges. To be successful the candidate must have experience working in a mature 24x7x365 Security Operation Center.
Shift schedule: Fri-Mon, 10PM-8AM ET (subject to change)
Salary Range: $135,000 - $155,000
General Description of Benefits
Required Skills
Desired Skills
ECS is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law.
ECS is a leading mid-sized provider of technology services to the United States Federal Government. We are focused on people, values and purpose. Every day, our 3800+ employees focus on providing their technical talent to support the Federal Agencies and Departments of the US Government to serve, protect and defend the American People.
ECS is seeking a Senior SOC Analyst/Lead to work remotely .
ECS is seeking a Senior SOC Analyst (SOC Lead) with demonstrated experience supporting the development of processes, procedures, and automations to rapidly ingest, aggregate, correlate, normalize, analyze event messages to absurdly identify and respond to Indicators of Compromise (IoCs). The ideal candidate is a critical thinker and perpetual learner who is excited to solve some of our clients' toughest challenges. To be successful the candidate must have experience working in a mature 24x7x365 Security Operation Center.
Shift schedule: Fri-Mon, 10PM-8AM ET (subject to change)
- Provides subject matter expertise for monitoring and managing threats, disseminating information, and handling, responding to, and investigating all incident escalations from the Security Operations Center.
- Ensures all security incidents are tracked and documented appropriately.
- Continuously monitors SIEM and on-premises infrastructure/cloud applications for security events to threats & intrusions, including:
- SIEM alert queue
- Phishing email inbox
- Intel feeds via email and other sources (i.e., US-CERT, MS-ISAC)
- Incident ticketing queue (Resilient tickets)
- Ensures the SOC manager stays informed of any issues or incidents.
- Coordinates with SOC staff to conduct incident/policy violation investigations, report infractions, eradicate/mitigate/remediate Indications of Compromise (IoC), and perform continuous monitoring functions.
- Leads root cause analysis and post-mortem dialogue after significant events to capture lessons learned and define process or technology improvements.
- Owns the successful completion of all daily operational processes and procedures.
- Develops and maintains standard operating procedures (SOPs), technical playbooks and operational run books to support SOC operations and incident response activities.
- Conduct follow-up meetings of escalated or noteworthy cases and modifies SOPs and playbooks based on policies, standards and best practices learned from previous cases.
- Works in conjunction with SOC and infrastructure management teams to administer and manage the SOC security technologies.
- Evaluates Common Vulnerabilities and Exposures (CVE) as a potential internal/external attach vector, develop recommendations to eliminate vulnerability/weakness if present.
- Work closely with Cyber Threat Intel to provide information on detection patterns for new upcoming threats.
- Oversees threat hunting initiatives and reviews hunt reports that are provided by SOC analysts.
Provides training and mentorship to SOC analyst to improve the incident handling capabilities. - Provides guidance for all internal stakeholders for reporting and visualizations that supports SOC goals and objectives to identify and correct gaps.
- Reconfigures analytic objects (e.g., fields, extractions, tags, event types, lookups, workflow actions, aliases).
- Develops reports for operational activities to meet SOC and cybersecurity leadership requirements and directives.
- Provides extensive knowledge of cybersecurity, incident response, digital forensic analysis and educate personnel on effective SOC searches, reporting, and visualization development.
Salary Range: $135,000 - $155,000
General Description of Benefits
Required Skills
- 5+ years of experience in cybersecurity operations & incident response, with at least 3+ years in a SOC environment and 2+ years in a leadership role
- Ability to interpret complex cybersecurity topics and effectively communicate or present information to various groups of stakeholders (Executives, SOC, etc.)
- In-depth knowledge of SIEM technologies (i.e. QRadar, Splunk), EDR (i.e. CrowdStrike), IDS/IPS, malware analysis, and vulnerability management tools (i.e.Tenable).
- Experiencing leading and mentoring junior analysts
- Experience with two or more analysis tools used in a CIRT or similar investigative environment.
- Ability to analyze and triage IoCs.
- Proven understanding of computer and network fundamentals
- Ability to perform in-depth research tasks and produce written summaries to include insights and predictions based on an analytical process.
- Knowledge of current cyber threats, trends, attack lifecycle, and various Tactics, Techniques, and Procedures (TTPs)
- Industry-recognized certifications, such as CISSP, CISM, GIAC, or CEH, are preferred
- Excellent leadership, written and oral communication skills, and problem-solving skills
- Ability to handle high-stress situations with a calm and methodical approach
Desired Skills
- Experience collecting, analyzing, and categorizing threat intelligence data from multiple sources to author actionable intelligence reports
- Deep understanding of computer architecture, operating systems, vulnerabilities, encryption, or other advanced areas of expertise
- Proven ability to drive incidents to conclusions based on SLA and severity ratings.
- Experience in threat hunting, forensics, or malware analysis.
- Knowledge of advanced persistent threats (APTs) and modern attack techniques.
- Proficiency with security automation (SOAR), orchestration, and scripting (Python, PowerShell, etc.) to enhance SOC operations & threat intelligence.
ECS is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law.
ECS is a leading mid-sized provider of technology services to the United States Federal Government. We are focused on people, values and purpose. Every day, our 3800+ employees focus on providing their technical talent to support the Federal Agencies and Departments of the US Government to serve, protect and defend the American People.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.