Cyber SOC Analyst

Cyber Incident, SOC
Full Time
Depends on Experience
Work from home not available Travel not required

Job Description

Do you want to work for a company that is passionate about security and has a fun, start-up culture with large company perks? Do you want to be in an environment where you will continuously learn new skills, grow and take on new opportunities due to the abundance of new projects on the horizon?

If you answered yes to these questions, this opportunity could be for you! 

Accenture Federal Services is seeking a Tier 2 Cyber SOC Analyst in Greenbelt, MD. This role operates on a Panama shift schedule, 12-hour shifts with alternating 3/4 day rotations (4th day is 8 hours).

Tier 2 Cyber SOC Analyst Job Responsibilities:


You will conduct network analysis of targets, operate daily open source research (OSR) missions, resulting in various reports and alerts, and possesses extensive knowledge on network, endpoint, threat intelligence, as well as the functioning of specific applications or underlying IT infrastructure, and has some experience with forensics tools, malware analysis, closely involved in developing, tuning and implementing threat detection analytics.

  • Work with alerts from the Tier 1 SOC Analysts, to perform in-depth analysis and triage of network security threat activity based on computer and media forensics, malicious code analysis, and protocol analysis
  • Assist with the development of incident response plans, workflows, and SOPs
  • Deploy and maintain security sensors and tools
  • Monitor security sensors and review logs to identify intrusions
  • Work directly with cyber threat intelligence analysts to convert intelligence into useful detection
  • Collaborate with the incident response team to rapidly build detection rules and signatures as needed
  • Identify incident root cause and take proactive mitigation steps
  • Review vulnerabilities and track resolution
  • Review and process threat intel reports and sources
  • Develop and implement detection use cases
  • Develop and implement IDS signatures
  • Assist with incident response efforts
  • Create and brief customer reports
  • Participate in on-call rotation for after-hours security and/or engineering issues
  • Perform customer security assessments
  • Develop and run table top exercises

Tier 2 Cyber SOC Analyst Job Qualifications:

  • This position requires US Citizenship due to our Federal contractual obligation
  • Bachelors Degree
  • 10 years of IT experience
  • 3 years of experience working in a SOC environment
  • Understanding of root causes of malware infections and proactive mitigation
  • Understanding of lateral movement and footholds
  • Understanding of data exfiltration techniques. Experience with critical thinking, problem-solving, and analytic concepts.
  • Real world experience analyzing complex attacks and understand TTPs of threat actors
  • Define relationships between seemingly unrelated events through deductive reasoning
  • Experience in network/host based intrusion analysis, malware analysis, forensics, and cyber threat intel
  • Knowledge of advanced threat actors and complex attacks
  • Knowledge of Splunk & ELK

Tier 2 Cyber SOC Analyst Preferred Skills:

  • Practiced knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS)
  • Good technical understanding of operating systems, network architecture and design, Active Directory (AD) application log consumables, systems design as well as superior knowledge of technical operations process and procedures
  • Knowledge of encryption, key management and cryptology
  • Familiarity with the Risk Management Framework (NIST 800-37), Security Controls as described in NIST 800- 35, and the Federal Information Security Modernization Act (FISMA) operating standards and applicable guidelines
  • Experience with performing threat modeling, risk analysis, root cause analysis, risk identification, and risk mitigation
  • Experience planning and implementing secure networking practices such as: application segmentation, network segmentation, NAC and other access control testing/validation, updating access control SOPs
  • Ability to configure and develop an enterprise SIEM solution including signature tuning, development of correlation rules, reports, and alarms
  • Familiarity with a variety of web application protocols, web services (components including JavaScript, XML, JSON), scripting capabilities (Power shell, Python) software development frameworks, operating systems, and networking technologies. Understanding of various web application frameworks such as ASP.NET, J2EE

Posted By

Chrissie Usher

Dice Id : 80104617
Position Id : 2019-48
Have a Job? Post it

Similar Positions

SOC Incident Response
  • CyberData Technologies
  • Rockville, MD
Cybersecurity Responder Analyst
  • ClearFocus Technologies LLC
  • Washington, DC
Tier 1 SOC Analyst
  • Base One Technologies
  • Alexandria, VA
Security Operations Center Analyst
  • United Data Technologies Inc
  • Washington, DC
Incident Response Analyst - Tier 1
  • Leidos
  • Alexandria, VA
SOC Technician - Tier 3
  • Comptech Associates Inc
  • Greenbelt, MD
ACAS Engineer
  • Axxum Technologies LLC
  • Alexandria, VA
Security Operations Center (SOC) - Cybersecurity Analyst
  • By Light Professional IT Services, Inc.
  • Annapolis Junction, MD
Senior Cyber Security Analyst
  • Bering Straits Native Corporation
  • Washington, DC
Tier 1 SOC Analyst
  • Smartlink, LLC (HQ)
  • Great Falls, VA
Overnight SOC Analyst
  • Attain
  • Herndon, VA
Information Security Engineer
  • Federal Bureau of Investigation (FBI)
  • Washington D.c., DC
Cybersecurity SOC Analyst Tier II
  • Perspecta
  • Herndon, VA
IT Security Administrator
  • Robert Half Technology
  • Bethesda, MD
Information Security Analyst(W2 only)
  • Proxim Systems
  • Reston, VA