Job Details

ID #17384038
State Georgia
City Atlanta
Job type Full-time
Salary USD TBD TBD
Source FireEye, Inc.
Showed 2021-07-27
Date 2021-07-27
Deadline 2021-09-25
Category Et cetera
Create resume

Senior SOC Analyst (Remote-USA)

Georgia, Atlanta, 30301 Atlanta USA

Vacancy expired!

Job Description

The Mandiant FireEye Consulting team is seeking a passionate and highly skilled SOC analyst to support a critical customer mission! The SOC analyst is the point individual for floor activity and will frequently interface with the Federal SOC leadership, component security staff, and external Federal leadership. This person shall be knowledgeable handling security events and tracking them from start to closure. The SOC analyst shall ensure security events are understood and should have the ability to perform analysis on events to determine their impact on the Customer’s Enterprise. The SOC analyst shall be able to competently operate any security tools being used and place and escalate security tickets.

If you are fanatical about security, will do whatever it takes to keep the bad guys out, enjoy hunting for attackers, thrive on responding to security incidents and interested in designing creative solutions to enhance our client’s security posture then we want to hear from you!

What You Will Do:

  • Provide strong leadership and guidance in a Security Operations Center
  • Lead process design, improvement, and updates to standard operating procedures
  • Provide recommendations to SOC leadership on workflows and team structure
  • Brief SOC leadership on cyber security events and other incident related issues
  • Provide expert independent services and leadership in specialized technical areas
  • Advise SOC leadership and oversee team regarding state-of-the-art software/hardware
  • Ensure problems are clearly defined and devise solutions to satisfy Government requirements
  • Please note that this position is remote with occasional TDY to Orlando, FL (anticipated 15% Travel)

Qualifications

Minimum Requirements:

  • Bachelor’s degree in a technical discipline (or a degree + relevant work experience)
  • Minimum 3 years of cyber security operations experience, 5 years of overall experience
  • Knowledge of Packet Analysis, exploits within network traffic, intrusion detection, root kits, and various malware
  • Experience with security event analysis, incident response, computer forensics, and malware analysis, or other
  • Ability to support Elastic SIEM, F5, Suricata, Splunk, Novetta Cyber Analytics, Snort IDS, and Bro IDS
  • Fundamental understanding of network protocols and TCP/IP, Unix, and Windows operating systems
  • Awareness of popular attack tools (e.g., Zeus, Blackhole, Slowloris, LOIC, Cryptolocker, Pony Loader, etc.)
  • Familiarity with tradecraft used by APT groups, nation-state, and non-state actors
  • Ability to communicate effectively the actual status of an incident, attack, or other cyber issue
  • Familiarity with supporting cybercrime investigations to include seizure, analysis, and data recovery
  • Ability to determine false positives quickly based on detection and to escalate true positives as appropriate

Desired Qualifications:

  • IAT I or II level certification (Security+, CEH, GIAC GCIA, GCIH, or CISSP)
  • Experience with STIGs, NIST, and CMMC
  • Familiarity with managing administrative abuses
  • Understanding of government
  • compliance Risk Management Framework
  • Clearance suitability

Additional Information

At FireEye we are committed to our #OneTeam approach combining diversity, collaboration, and excellence. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability.

Vacancy expired!

Subscribe Report job