Tier 3 SOC Analyst

(7) years of professional experience in incident detection and response, malware analysis, or cyber forensics, or a bachelors degree in Computer Science, Engineering, Information Technology, Cyberse
Contract Corp-To-Corp, Contract W2, 50+ months
Market rate
Work from home not available Travel not required

Job Description

Our DC metro based client is looking for Tier 3 SOC Analyst. Local candidates are preferred. In person meeting is required prior hiring.  US CITIZENSHIP AND ACTIVE TS ARE required for these openings.

 

Tier 3 Analyst

All Tier 3 Analyst candidates shall have a minimum of seven (7) years of professional experience in incident detection and response, malware analysis, or cyber forensics, or a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field and a minimum of five (5) years of experience in incident detection and response, malware analysis, or cyber forensics.  The candidates must have extensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations, evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations.

Of the seven (7) years of professional experience requirements above, Tier 3 Analyst candidates shall have the following specialized experience for their position:

 

Monitoring and Detection Analyst

Shall have a minimum of five (5) years of professional experience in security, information risk management, or information systems risk assessment, and must be knowledgeable in many areas such as: Vulnerability Assessments, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Data Loss Prevention (DLP), Encryption, Two-Factor Authentication, Web-filtering, and Advanced Threat Protection.

 

Incident Response Analyst

Shall have a minimum of five (5) years of professional experience responding to information system security incidents.  Ability to use the DHS furnished toolset to identify and determine root causes of incidents and provide any required documentation and possible evidence to security investigators.

 

Vulnerability Assessment Analyst

Shall have at least five (5) years of professional experience in vulnerability assessment and penetration testing.

 

Cyber Intelligence Analyst

Shall have at least five (5) years of professional experience in collecting, synthesizing, fusing, or authoring unclassified and classified cyber threat intelligence products.

 

SOC Tool Engineering, Operations and Maintenance

Shall have at least three (3) years of professional experience in incident detection and response, and at least three (3) years of experience in system administration, database administration, network engineering, software engineering, or software development, and a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. 

 

 

If you are interested in this opening, please forward a copy of your most recent resume in word format to lli@base-one.com

 

Dice Id : baseone
Position Id : LL0078SOCDC
Have a Job? Post it

Similar Positions

Cyber Security Engineer
  • Leidos
  • Suitland, MD
Cyber Security Engineer
  • Confidential Company
  • Mclean, VA
Cyber Security Engineer
  • ConsultNet, LLC
  • Reston, VA
Cyber Security Engineer
  • SAIC
  • Reston, VA
Cyber Security Engineer
  • Petra Technologies Inc
  • Chevy Chase, MD
SENIOR Security (SOC) Analyst
  • Trigyn Technologies, Inc.
  • Ashburn, VA
Information Security Engineer
  • BigBevy Consulting
  • Rockville, MD
Lead Security Engineer
  • Ettain Group
  • Reston, VA
JUNIOR LEVEL-SECURITY ENGINEER (X2)
  • VISION INFOTECH INC.
  • Manassas, VA
Cyber Security Engineer
  • Capital Markets Placement
  • Arlington, VA