Cyber Security Analyst/SOC Analyst
Location: WASHINGTON, DC, United States Hybrid role – 2 day in a week onsite and 3 days in a week remote role
Job Description
Job Description
Client is currently seeking a Cyber Security Analyst/SOC Sr. for a project in Washington, DC. The ideal candidate for this job will serve as a Security Administrator within the federal client’s Security Operations Center. A highly-motivated individual with strong technical, communication, and organizational skills will succeed on this program.
The goal of the Security Operations Center (SOC) team is to proactively monitor, identify, and remediate information technology security vulnerabilities and intrusions. The team needs to ensure that all operational security controls are appropriately applied and managed and that systems within the control of the SOC have appropriate security controls in place in accordance with the Federal Information Security Management Act (FISMA). To accomplish this goal, the security team is responsible for a broad suite of security technologies that include vulnerability scanning, malware detection, log file analysis, and enterprise-wide incident response and security information and event management (SIEM) tools. The analyst will be responsible for continuous surveillance, analysis, mitigation, remediation and incident management using the client’s current SOC suite of tools.
ESSENTIAL DUTIES & RESPONSIBILITIES
The Essential Duties and Responsibilities are intended to present a descriptive list of the range of duties performed for this position and are notintended to reflect all duties performed within the job. Other duties may be assigned.
- Intrusion detection
- Cyber incident response
- Perform cyber investigations and analysis
- Cross-train and mentor other staff members
- Ability to proficiently utilize the client’s wide variety of security tools including:
- ArcSight HP
- Akamai Web Application Firewall
- HP TippingPoint
- Bit9 Carbon Black
- Websense Web, Email, and DLP
- Cylance Protect
- Palo Alto Firewalls
- RSA Security Analytics/NetWitness
- Xceedium
- Tripwire IP360, CCM, and Enterprise
- SolarWinds
- LANDesk
- ForeScout CounterACT
- Symantec Endpoint Protection
- Splunk Enterprise
- EnCase Enterprise
- Remedy
QUALIFICATIONS - EXPERIENCE, EDUCATION AND CERTIFICATION
To perform this job successfully, an individual must be able to satisfactorily perform each essential duty. The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Required (Minimum) Qualifications
- Moderate-level understanding of basic computer and networking technologies
- TCP/IP stack
- Windows operating systems
- Networking technologies (routing, switching, VLANs, subnets, firewalls)
- Common networking protocols – SSH, SMB, SMTP, FTP/SFTP, HTTP/HTTPS, DNS, etc.
- Common enterprise technologies – Active Directory, Group Policy, VMware vSphere
- Basic-level understanding of IT security principles, technologies, best practices, and NIST guidance
- Logical Access Control
- PKI and other encryption methods
- Network-based and host-based IDS/IPS
- Ability to obtain and maintain Public Trust Security Clearance.
- Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information. Accordingly, U.S. Citizenship is required.
- High School or GED-General Educational Development-GED Diploma
- Bachelor’s degree preferred or equivalent work experience.
- CompTIA Security+
- CISSP
- Microsoft Certified: Security, Compliance, and Identity Fundamentals (SC-900)
- Microsoft Certified: Azure Fundamentals (AZ-900)
- Microsoft Certified: Security Operations Analyst Associate (SC-200)
- SANS GIAC Certified Incident Handler (GCIH)
Knowledge, Skills and Abilities
- Excellent analytical and problem solving skills. Ability to work independently to identify errors, pinpoint root causes, and devise solutions with minimal oversight.
- Outstanding communication skills. Ability to communicate with senior management and federal client staff – both technical and non-technical – in a clear and concise manner using proper spelling, punctuation and grammar.
- Word, Excel, PowerPoint
Preferred
- Server Administration background – Windows or Linux/Unix
- Interest in security/hacking culture. Ability to “think like an attacker”
- Certifications:
- Network+
- Certified Ethical Hacker (CEH)
- Systems Security Certified Practitioner (SSCP)
- Certified Information System Security Professional (CISSP)
Job Type: Contract
Salary: $46.33 - $65.00 per hour
Benefits:
- 401(k)
- Dental insurance
- Health insurance
Experience level:
- 10 years
- 9 years
Schedule:
- 8 hour shift
License/Certification:
- CISSP (Required)
- Microsoft Certified: Azure fundamentals (Required)
- GCIH (Required)
- SC-900 (Required)
Ability to Relocate:
- Washington, DC 20001: Relocate before starting work (Required)
Work Location: In person