Security Operations Center Analyst Tier II

  • location: Pope A F B, NC
  • type: Permanent
  • salary: $95,000 - $102,000 per year

job description

Security Operations Center Analyst Tier II

job summary:
Seeking a SOC Analyst with at least 4 years of experience in Information Assurance in a DoD environment is required. You will provide Tier II support. Must be a team player, willing to work challenging assignments and tasks concerning Cyber Security, Information Assurance and Computer Network Defense. Our customer is one of the elite military units of the world. You will work in a culture where you are surrounded by motivated and driven professionals focused on solving the nation's most difficult tactical problems. You will be counted on to be the onsite SME in your area of responsibility.



  • Provide Security Operation Center (SOC) Analyst Tier 2 functions of deep-dive incident analysis by correlating data from various sources determine if a critical system or data set has been impacted; advises on remediation; provides support for new analytic methods for detecting threats. Conduct incident handling functions of containment, eradication and recovering, close out reports and lessons learned. Escalate to Tier 3 Analyst or SOC Manager for malware analysis or adversity hunt mission.

    • Review alerts to determine relevancy and urgency and communicate alerts to agencies regarding intrusions to the network infrastructure, applications, and operating systems
    • Create trouble tickets for alerts that signal an incident and require Tier 3 / Malware Analysis and Hunt Team Response.
    • Collaborate with other teams to assess risk and develop improvement strategies for security posture.
    • Monitor open source channels (e.g. vendor sites, Computer Emergency Response Teams, SysAdmin, Audit, Network, Security (SANS) Institute, Security Focus) to maintain a current understanding of Computer Network Defense (CND) threat condition and determine which security issues may have an impact on the enterprise.
    • Leverages tools such as HBSS, Splunk, ESM, NSM, Netflows, IDS, StealthWatch, ForeScout, as part of duties performing cyber incident response analysis
    • Collect intrusion artifacts (e.g., source code, malware, and Trojans) and use discovered data to enable mitigation.
    • Write and publish CND guidance and reports (e.g. engagement reports) on incident findings to appropriate constituencies.
    • Create and track security investigations to resolution.
    • Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
    • Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
    • Stay up to date with current vulnerabilities, attacks, and countermeasures.
Education and/or Certifications:

  • Must meet DoD 8570.01-M minimum of IAT Level III Certification (i.e. CISSP).
Required Skills:

  • 4 year experience in Information Assurance
  • Ability to work as part of a team
  • Excellent oral and written communication skills
  • Willingness to provide knowledge sharing to representatives selected by customer
Desired Skills:

  • Military Experience (Active Duty or Reserves)
  • Experience with Cyber Security in a Joint and Coalition Partner environment
Clearance:

  • Top Secret /SCI
Travel:

  • Unlikely, but candidate must be willing to travel
 
location: Pope Army Airfield, North Carolina
job type: Permanent
salary: $95,000 - 102,000 per year
work hours: 8am to 4pm
education: Bachelors
 
responsibilities:
  • Review alerts to determine relevancy and urgency and communicate alerts to agencies regarding intrusions to the network infrastructure, applications, and operating systems
  • Create trouble tickets for alerts that signal an incident and require Tier 3 / Malware Analysis and Hunt Team Response.
  • Collaborate with other teams to assess risk and develop improvement strategies for security posture.
  • Monitor open source channels (e.g. vendor sites, Computer Emergency Response Teams, SysAdmin, Audit, Network, Security (SANS) Institute, Security Focus) to maintain a current understanding of Computer Network Defense (CND) threat condition and determine which security issues may have an impact on the enterprise.
  • Leverages tools such as HBSS, Splunk, ESM, NSM, Netflows, IDS, StealthWatch, ForeScout, as part of duties performing cyber incident response analysis
  • Collect intrusion artifacts (e.g., source code, malware, and Trojans) and use discovered data to enable mitigation.
  • Write and publish CND guidance and reports (e.g. engagement reports) on incident findings to appropriate constituencies.
  • Create and track security investigations to resolution.
  • Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
  • Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
  • Stay up to date with current vulnerabilities, attacks, and countermeasures.
 
qualifications:
  • Experience level: Executive
  • Minimum 4 years of experience
  • Education: Bachelors
 
skills:
  • SECURITY
  • SECURITY ANALYST
  • SOC
  • cyber
  • CISSP

Equal Opportunity Employer: Race, Color, Religion, Sex, Sexual Orientation, Gender Identity, National Origin, Age, Genetic Information, Disability, Protected Veteran Status, or any other legally protected group status.

get jobs in your inbox.

sign up
{{returnMsg}}

related jobs


    Cyber Security Analyst

  • location: Pope A F B, NC
  • job type: Permanent
  • salary: $120,000 - $130,000 per year
  • date posted: 3/22/2021

    Controller

  • location: Sanford, NC
  • job type: Permanent
  • salary: $90,000 - $110,000 per year
  • date posted: 4/18/2021