Job Title: SOC Analyst I - Junior SOC (Security Operations Center) Analyst
- An industry technical certification such as GCIH, MS-SC200 or equivalent.
SUMMARY: Agile Defense is currently seeking a talented and ambitious self-starting, Junior SOC (Security Operations Center) Analyst to join the Enterprise Security Operations Center (ESOC) team. This is a unique opportunity for the right candidate to embed themselves into the next generation of operational environments which is now taking place across the US government. The existing team is a multi-faceted interdisciplinary set of experts with ever-increasing prowess in this unique environment. Our Security Operations project is aimed at establishing innovative techniques for a comprehensive, cloud-first network enclave defense, identifying the emerging threats, and detecting malicious activity using advanced toolsets.
The SOC Analyst will join a team of multi-disciplinary experts to support a government agency's ESOC Incident Response (IR) capabilities. The SOC Analyst will be responsible for working as part of an integrated security team composed of federal employees and contractors from multiple companies The SOC analyst will also support the day-to-day IR activities and will be responsible for the daily review of security events.
JOB DUTIES AND RESPONSIBILITIES
- Investigate security events using various customer and industry tools to identify potential incidents and perform actions to contain incidents in progress.
- Monitor and analyze logs and alerts from a variety of different systems and tools across multiple platforms in order to respond and report suspected or actual security breaches.
- Develop procedures for use, interpretation, and response to the monitoring and alert information collected.
- Monitor security systems and events to detect and investigate threats, identify and analyze traffic trends, assess the impact of security alerts and traffic anomalies on the customer's network in order to make appropriate recommendations.
- Support daily and hourly monitoring of incident reporting email boxes.
- Support IR team activities in response to security incidents. Activities include but to limited to ensuring completion of the incident from detection thru closure, participating in IR meetings and sharing analysis with other branch/division stakeholders, providing situational awareness information to appropriate stakeholders, correlating multiple alerts and incidents to determine widespread attacks, and providing incident status reports to team management and other stakeholders/leadership.
- This is a non-supervisory position.
QUALIFICATIONS
- An industry technical certification such as GCIH, MS-SC200 or equivalent.
- Bachelor's degree in Computer Science, or related field.
- 3 years of experience in incident response with 1-2 years of experience in network defense environments preferred.
ADDITIONAL SKILLS & QUALIFICATIONS
- An industry technical certification such as GCIH, MS-SC200 or equivalent
- 1 - 3 years of experience with tools such as Active Directory, Azure Active Directory, AD Connect, SAML, Kerberos, Cisco IOS, MS Server, Azure cloud environments, Incident Handling, Threat hunting experience, fundamental knowledge of IEEE 7 layers.
- Experience with deployment and documentation of enterprise project management and change management processes.
- Ability to identify solutions to potential network issues/embrace network simplification and strengthened security.
- Ability to conduct event triage and analysis and incident investigation.
- Ability to write threat reports and incident reports.
- Familiarity with NIST and DHS US-CERT incident response requirements and guidelines. Ability to work independently and with other teams.
- Excellent writing, interpersonal and communication skills using standard office automation tools (e.g. Microsoft Office_.
- Understanding of command line scripting and implementation (e.g., Python, Powershell).
- Ability to write latest content/searches/scripts (e.g., Create dashboards, Sentinel alerts, Python scripts, Powershell scripts).
- Familiarity with differences in on-prem OPSEC in relation to cloud-based security.
- Strong understanding of networking (TCP Flags, TCP Handshake, IP addressing, Firewalls, Proxy, IDS, IPS).
- Ability to perform Netflow / packet capture (PCAP) analysis.
- Experience with cyber threat hunting.
WORKING CONDITIONS
- This is a remote position with 0% travel possible.
- Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required. Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.
- Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; See
These Core Values are present in all our employees and our organization's aspects. Learn more about us and our culture by visiting us here.
COVID-19 Vaccination Requirements
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities