Sorry, this job is no longer accepting applications. See below for more jobs that match what you’re looking for!

SOC Analyst

Expired Job

JCD Staffing Washington , DC 20001

Posted 4 months ago

SOC Analyst Washington DC

Description:

This position requires shift work. The SOC Tier 2 Analyst supports a 24/7/365 Security Operations Center and monitors security tools and provides first tier response to security incidents. The analyst follows standard operating procedures for detecting, classifying, and reporting incidents under the supervision of Tier 2 and Tier 3 staff.

Shift is Day Team B (7 a.m. to 7 p.m. Wed/Thurs/Fri/Sat (week 1) Thurs/Fri/Sat (week 2)

  • Bachelor's Degree in an IT-related field
  • Excellent written and oral communication skills
  • Self-motivated and able to work in an independent manner
  • Security Operations Center (SOC) environment experience with some security engineering and monitoring experience such as:
    • Dedicated monitoring and analysis of cyber security events (Triage)
    • Event of Interest (EOI) handling and escalation
    • Incident Response generation and reporting
    • Processing of incident communications to include initial reporting, follow-ups, requests for information and resolution activity
  • COMPTIA Security + or other relevant networking or software engineering certifications desired
  • Knowledge of the following tools: Splunk, SourceFire, Imperva WAF, McAfee ePO, ForeScout NAC is a plus
  • Active Secret clearance is required!
See if you are a match!

See how well your resume matches up to this job - upload your resume now.

Find your dream job anywhere
with the LiveCareer app.
Download the
LiveCareer app and find
your dream job anywhere
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
SOC Analyst

Attain

Posted 3 months ago

VIEW JOBS 10/10/2018 12:00:00 AM 2019-01-08T00:00 Who We Seek: * Passion Seekers. You genuinely care about the work that you do and its impact on society. * Self-Starters. You're a go-getter who isn't afraid to step up and disrupt the status quo. * Entrepreneurs. You bring fresh ideas to the table, work hard, develop business and consistently seek new challenges. * Collaborators. You're a great contributor to a high performing team that accomplishes great feats for our clients. What You Need: * Must possess strong organizational, analytical and attention to detail skills. * Must have the ability and prior experience with analyzing information technology security events to discern events that qualify as a legitimate security incidents as opposed to non-incidents. This includes the identification of malicious code present within a computer system as well identification of malicious activities present within a computer system and/or enterprise network. * Must have experience working with a ticket management system to collect, document and maintain information pertinent to security investigations and incidents. * Must possess excellent verbal and written communications skills and ability produce clear and thorough security incident reports and briefings. * Must possess experience in monitoring the operational status of monitoring components and escalating and reporting outages of the components. * Must possess a working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks. A conceptual understanding of Windows Active Directory is also required. * Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.) * Must have experience working with various event logging systems and must be proficient in the review of security event log analysis. Previous experience with Security Information and Event Monitoring (SIEM) platforms that perform log collection, analysis, correlation, and alerting is also required. * Must have experience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment. * Must possess experience in collecting and maintaining information pertinent to security investigations and incidents in a format that supports analysis, situational awareness reporting, and law enforcement investigation efforts. Additional Qualifications: * At minimum, MUST possess an Interim Secret Clearance * At least three years of experience working in a network security operations center environment performing security event monitoring and analysis. * 10 hour shifts and must be available to work one of three shifts. * Certification: Security+, GSEC or equivalent certification is desired but not required. * Travel: <5%</span> About Us: Attain is a place for great ideas and the people who have them. As a management, technology, and strategy consulting firm, our professionals provide innovative solutions to revolutionize government, education, health, and nonprofit organizations and positively impact those they serve. We are business analysts, technologists, digital strategists, managers of change, and forward thinkers, with the entrepreneurial drive to shape the future. Our team is present in 40 states and the District of Columbia. Visit www.attain.com/careers to explore your path forward with Attain. DICE123 CJ123 Attain Washington DC

SOC Analyst

Expired Job

JCD Staffing