Tier 2 SOC Analysts

secret, soc, ceh, 24/7/365, Email Security, Monitoring, detection, Incident response, Adaptability, Bash, Architecture, CAN, CISSP, Cellular, Certified Ethical Hacker, Cisco Certifications, Cloud security, Continuous monitoring, Cyber security, DoD, ECSA, EOD, Encryption, Federal government, Forensics, GCIA, Government, Incident management, Information systems, Internet, Intrusion detection, Investigation, LAN, Law enforcement, Leadership, Log analysis, Malware analysis, Mentorship, Mergers and acquisitions, Mobile, Network forensics, Network security, Networking, OSCP, Penetration testing, Problem solving, Project management, Python, ROOT, Reasoning, Relationship building, Reporting, Research, Reverse engineering, SEI, Scripting, Security, Security analysis, Security clearance, Security operations, Self motivated, Software development, Software engineering, Supervision, System on a chip, Tier 2, Troubleshooting, Visual Basic, WAN, Web applications, Windows PowerShell, Wireless communication
Contract W2, 8 Years
Travel not required

Job Description

Our DC Metro based client is looking for Tier 2 SOC Analysts. All applicants must be Those authorized to work in the United States without sponsorship are encouraged to apply.S with an active Secret or higher. If you are qualified for this position, please forward a copy of your updated resume in word format to . Thank you.

Location: St Elizabeths Campus, DC

Must Have One of the Following J3 Certifications

Tier 2 Monitoring:

GCIA Intrusion Analyst

GREM Reverse Engineering Malware

GPPA Perimeter Protection Analyst

GISF Security Fundamentals

GXPN Exploit Researcher and Advanced Penetration Tester

GWEB Web Application Defender

GNFA Network Forensic Analyst

GMON Continuous Monitoring Certification

OSCP (Certified Professional)

OSCE (Certified Expert)

OSWP (Wireless Professional)

OSEE (Exploitation Expert)

SEI (Software Engineering Institute)

CCSP Certified Cloud Security Professional

CISSP Certified Information Systems Security

CCNA Security

CCNP Security

CEH Certified Ethical Hacker

LPT Licensed Penetration Tester

ECSA EC-Council Certified Security Analyst

ENSA EC-Council Network Security Administrator

CNDA Certified Network Defense Architect

ECSS EC-Council Certified Security Specialist

ECSP EC-Council Certified Secure Programmer

ECES EC-Council Certified Encryption Specialist

Cyber Analyst Course

Primary Responsibilities

Our client, Enterprise Security Operations Center (ESOC) is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to client s networks through monitoring, intrusion detection and protective security services to ESOC. Information systems include local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers, and workstations. The ESOC is responsible for the overall security of Enterprise-wide information systems, and collects, investigates and reports any suspected and confirmed security violations.

The ESOC Program has a critical need for a talented Tier 2 Monitoring & Analysis (M&A) Analyst to join our team on this highly visible cyber security single-award IDIQ vehicle that provides ESOC support, cyber analysis, application development, and a 24x7x365 support staff. As a Tier 2 Analyst, you would work on a shift schedule, as described below. All shifts total 80 hours every 2 weeks, and multiple shift options are often available.

  • Day: 7 AM to 7 PM

  • Night: 7 PM to 7 AM

  • Front: Sunday through Tuesday, with alternating 8-hour shifts every other Wednesday

  • Back: Thursday through Saturday, with alternating 8-hour shifts every other Wednesday

    In this job, you will:

  • Conduct malware analysis, host and network, forensics, log analysis, and triage in support of incident response.

  • Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response.

  • Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.

  • Lead Incident Response activities and mentor junior SOC staff.

  • Work with key stakeholders to implement remediation plans in response to incidents.

  • Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership.

  • Be a flexible and adaptable self-starter with strong relationship-building skills

  • Demonstrate strong problem solving abilities with an analytic and qualitative eye for reasoning

  • Demonstrate ability to independently prioritize and complete multiple tasks with little to no supervision

    Basic Qualification

    The candidate must be able to attain a DoD Public Trust Clearance

    The candidate must be able to attain a Govt EOD Clearance.

    A Tier 2 SOC Analyst should have expertise in one of the following specialized areas:

  • Email Security

  • Monitoring and detection

  • Incident response

  • Cyber intelligence analysis

  • Supporting detection, containment, and eradication of APT activities targeting customer networks.

    Preferred Qualification

  • Ability to script in Python, Bash, Visual Basic, or Powershell

  • Knowledge of Cyber Kill Chain (CKC) or similar frameworks

  • Experience in cyber government, Department of Homeland Security, and/or federal law enforcement

Dice Id : baseone
Position Id : T2SOCDC
Originally Posted : 1 year ago
Have a Job? Post it

Similar Positions

SOC Incident Response
  • CyberData Technologies
  • Rockville, MD
SOC Analyst
  • Apex Systems
  • Washington D.c., DC
Jr SOC Analyst - Secret Cleared
  • Zachary Piper Solutions, LLC
  • Beltsville, MD
Incident Responder
  • H & R Computer Consulting Services
  • Washington D.c., DC
Security - Cyber Threat Analysts
  • Addison Group
  • Mclean, VA
Senior Cyber Security Threat Intelligence Analyst
  • Bering Straits Native Corporation
  • Washington, DC