SOC Technician - Tier 3

Security, Cyber, SAN
Contract W2, Contract Independent
Depends on Experience
Work from home not available Travel not required

Job Description

Title: SOC Tier 3 Technician

Location: Greenbelt, MD

Role Description: The Security Operations Center Analyst will possess in-depth knowledge on network, endpoint, threat intelligence, forensics and malware reverse engineering, as well as the functioning of specific applications or underlying IT infrastructure; acts as an incident "hunter, not waiting for escalated incidents; closely involved in developing, tuning and implementing threat detection analytics.

Required Skills: Preferred Certifications: Certifications could include:
SANS SEC503: Intrusion Detection In-Depth;
SANS SEC504: Hacker Tools, Techniques, Exploits and Incident Handling;
SANS SEC561: Intense Hands-on Pen Testing Skill Development;
SANS FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques.
CCNA Cyber Ops
Offensive Security Certified Professional (OSCP)
Offensive Security Exploitation Expert (OSEE)
Certified Expert Penetration Tester (CEPT)
Certified Reverse Engineering Analyst (CREA)
Certified Computer Forensics Examiner (CCFE)
Training on anomaly detection; tool-specific training for data aggregation and analysis and threat intelligence
Splunk Certified User or Power User
Splunk Certified Admin
DoD certs
Advanced training on anomaly detection; tool-specific training for data aggregation and analysis and threat intelligence
Assist with the development of incident response plans, workflows, and SOPs
Deploy and maintain security sensors and tools
Monitor security sensors and review logs to identify intrusions
Using a high-level scripting/programming language to extract, de-obfuscate, or otherwise manipulate malware related data
Think critically and creatively while analyzing security events, network traffic, and logs to engineer new detection methods
Work directly with cyber threat intelligence analysts to convert intelligence into useful detection
Collaborate with incident response team to rapidly build detection rules as needed
Identify incident root cause and take proactive mitigation steps
Perform lessons learned activities
Mentor junior analysts and run brown bag training sessions
Review vulnerabilities and track resolution
Review and process threat Client reports
Develop and implement detection use cases
Develop and implement IDS signatures
Assist with incident response efforts
Create and brief customer reports
Participate in on-call rotation for after-hours security and/or engineering issues
Perform customer security assessments
Develop and run table top exercises
Job Requirements:
Fuse locally derived and externally sourced cyber threat intelligence into signatures, detection techniques, and analytics intended to detect and track the advanced threat
Strong understanding of root causes of malware infections and proactive mitigation
Strong understanding of lateral movement and footholds
Strong understanding of data exfiltration techniques. Demonstrated ability in critical thinking, problem solving, and analytics
Enjoy analyzing patterns looking for outliers
Enjoy creating ways to find needles in haystacks
Have real world experience analyzing complex attacks and understand TTPs of threat actors
Define relationships between seemingly unrelated events through deductive reasoning
Experience in network/host based intrusion analysis, malware analysis, forensics, and cyber threat Client
Knowledge of advanced threat actors and complex attacks
Possess excellent writing skills and the ability to communicate to technical and executive level staff
Quick study with new tools
Knowledge of Splunk
Required/Desired Skills:
Expert knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS)
Deep technical understanding of operating systems, network architecture and design, Active Directory (AD) application log consumables, systems design as well as superior knowledge of technical operations process and procedures
Knowledge of encryption, key management and cryptology
Familiarity with the Risk Management Framework (NIST 800-37), Security Controls as described in NIST 800-35, and the Federal Information Security Modernization Act (FISMA) operating standards and applicable guidelines
Experience with performing threat modelling, risk analysis, root cause analysis, risk identification, and risk mitigation
Experience planning and implementing secure networking practices such as: application segmentation, network segmentation, NAC and other access control testing/validation, updating access control SOPs
Ability to configure and develop an enterprise SIEM solution including signature tuning, development of correlation rules, reports, and alarms
Familiarity with a variety of web application protocols, web services (components including JavaScript, XML, JSON), scripting capabilities (Power shell, Python) software development frameworks, operating systems, and networking technologies. Understanding of various web application frameworks such as ASP.NET, J2EE
Organizational Skills: Proven ability to plan and prioritize work, both their own and that of project team. Follows tasks to their logical conclusion. Understanding of project management principles and techniques (project plans, critical path, etc.), ability to develop security project plans and work with development teams to integrate those into development schedules - in both waterfall and agile environments.
o Team Work: Excels both autonomously and as part of a team. Prepared to challenge ideas within a group in a constructive way. Ability to influence others and move a team toward a common vision or goal.
o Leadership: Acute business acumen and understanding of organizational issues and challenges. Able to work effectively at all levels in an organization.
o Communications: Ability to interact with senior managers, junior staff, and business unit (non-technical) customers clearly and efficiently, both verbally and in writing. Able to present ideas in a variety of ways depending upon audience and context. Excellent active listening skills.
o Problem Solving: Natural inclination for planning strategy and tactics. Ability to analyze problems and determine root cause, generating alternatives, evaluating and selecting alternatives and implementing solutions.
o Results oriented: Able to drive things forward regardless of personal interest in the task

Posted By

Agnes Reena

1075 Easton Ave, Tower 1 Ste 4 Somerset, NJ, 08873

Dice Id : 10124406
Position Id : 5927664
Have a Job? Post it

Similar Positions

Tier 1 SOC Analyst
  • Base One Technologies
  • Alexandria, VA
SOC Incident Response
  • CyberData Technologies
  • Rockville, MD
Cyber SOC Analyst
  • Accenture Federal Services
  • Greenbelt, MD
Incident Response Analyst - Tier 1
  • Leidos
  • Alexandria, VA
Cyber Hunt & Incident Response Analyst
  • Axxum Technologies LLC
  • Arlington, VA
Security Operations Center (SOC) - Cybersecurity Analyst
  • By Light Professional IT Services, Inc.
  • Annapolis Junction, MD
Cybersecurity Responder Analyst
  • ClearFocus Technologies LLC
  • Washington, DC
Security Operations Center Analyst
  • United Data Technologies Inc
  • Washington, DC
Senior Incident Response Analyst
  • Bering Straits Native Corporation
  • Washington, DC
Overnight SOC Analyst
  • Attain
  • Herndon, VA
SOC Security Engineer
  • NetSource, Inc.
  • Herndon, VA
SOC Analyst
  • Serigor
  • Washington D.c., DC