Vacancy expired!
As a Security Operations Center (SOC) Analyst, you support the 24x7x365 SOC by providing a consolidated enterprise view of security events and network activity. Currently, SOC Analysts work shifts, on site. This is an excellent opportunity to learn and apply cybersecurity fundamentals using leading edge tools for a large defense contractor. As a Security Operations Center Analyst working at the Tier 2/3 level, you will provide a Cybersecurity partnership with the client to ensure proper implementation of protections toward current and future projects.
As SNC's corporate team, we provide the company and its business areas with strategic direction and business support spanning executive management, finance and accounting, operations, human resources, legal, IT, information security, facilities, marketing, and communications. Learn more about SNC's Corporate teamResponsibilities Include:- Perform regular analysis of specified logging, intrusion detection, malware scanning reports and raw outputs, escalating potential business threats and risks
- Perform required tasks and coordinate with client team members to rapidly isolate, contain, and remediate client system intrusions
- Coordinate incident response and investigation activities with client teams as well as internal organizations in an efficient and professional manner
- Participate in market reviews and product evaluation of tools to enhance the client's security posture against existing and emerging threats
- Assist in drafting written guides and process reference materials to support policy and compliance requirements
- Analyze and correlate incident event data to develop preliminary root cause and corresponding remediation strategy by using various data analytics techniques
- Support the Operations Center team with other investigative duties
- Bachelor's degree in Cybersecurity, Network Engineering, Information Technology, or related Engineering discipline and typically 2 - 4 years of relevant experience
- Knowledge and experience with a variety of current Microsoft platforms
- Knowledge of data security administration principles, methods, and techniques
- Ability to effectively execute multiple, complex tasks
- Ability to read and interpret security and technical documentation
- Strong interpersonal and written communication skills
- Ability to maintaining confidentiality of high-sensitivity projects and data
- Ability to perform critical-incident response
- Ability to commit to a role that requires shift work
- The ability to obtain and maintain a Secret U.S. Security Clearance is required. Learn more about the background check process for Security Clearances
- Demonstrate understanding of attack chains (MITRE ATT&CK Framework) with an understanding of intrusion set Tactics, Techniques, and Procedures
- Demonstrate hands-on experience analyzing high volumes of logs, network data (e.g. Netflow, Full Packet Capture), and other artifacts in support of incident investigations
- Motivated self-starter with strong written and verbal communications skills, and the ability to create complex technical reports on analytic findings
- Experience and proficiency with any of the following: Anti-Virus, IDS/IPS, Full Packet Capture, Host-Based Forensics, Network Forensics, SIEM
Vacancy expired!