SOC Mid-Level Analyst jobs in United States
cer-icon
Apply on Employer Site
company-logo

ECS · 1 day ago

SOC Mid-Level Analyst

ECS is a leading mid-sized provider of technology services to the United States Federal Government. They are seeking a Mid-Level SOC Analyst to support the development of processes and automations for security operations and incident response. The role involves monitoring security events, responding to incidents, and conducting threat hunting activities.

Artificial Intelligence (AI)Cloud InfrastructureComplianceConsultingCyber SecurityInformation TechnologyMachine LearningSecuritySoftware
badNo H1BnoteU.S. Citizen Onlynote

Responsibilities

Continuously monitors SIEM and on-premises infrastructure/cloud applications for security events to threats & intrusions, including:
SIEM alert queue
Phishing email inbox
Intel feeds via email and other sources (i.e., US-CERT, MS-ISAC)
Incident ticketing queue
Participates with responding to and handling all critical incident activity. Ensure the execution of proper containment, remediation, and recovery activities
Assesses and documents lessons learned as part of post-incident review, such as unsuccessful controls, outdated procedures, or incomplete remediation actions
Coordinates with SIEM engineering to tune security events and alerts for improving alert fidelity
Assists with creating and tuning Security Orchestration and Automation (SOAR) playbooks and automated workflows
Performs proactive threat hunting to identify and characterize new emerging threats, vulnerabilities, and risks
Works closely with Cyber Threat Intel to provide information on detection patterns for new upcoming threats
Compiles threat hunt reports as requested on any specific hunt/threat inquiry and disseminate to SOC leadership
Conducts research and document events of interest within the scope of Cybersecurity

Qualification

SIEM experienceIntrusion analysisThreat huntingCybersecurity Framework knowledgeMITRE ATT&CK Framework knowledgeSecurity certificationsAnalytical mindsetEngaging personalityCloud security

Required

Minimum of 3 years experience conducting analysis of log data in support of intrusion analysis or information security operations
Bachelors degree or equivalent with relevant certifications
Experience with two or more analysis tools used in a CIRT or similar investigative environment
Ability to build content in SIEM system
Ability to analyze and triage IoCs

Preferred

Strong analytical mindset with an open and engaging personality
Cloud security, threat hunting, security operations
Knowledge of the Cybersecurity Framework (CSF) and MITRE ATT&CK Framework
Preferred Certifications (one or more):
Certified Ethical Hacker (CEH)
Certified Information System Security Professional (CISSP)
Certified Information Systems Auditor (CISA)
CompTIA Security+
Computer Hacking Forensic Investigator (CHFI)

Company

ECS is a fast-growing 4,000-person, $1.2B provider of advanced technology solutions for federal civilian, defense, intelligence, and commercial customers.

Funding

Current Stage
Late Stage
Total Funding
unknown
2018-01-31Acquired
2015-04-10Private Equity

Leadership Team

leader-logo
Keith McCloskey
VP / Chief Technology Officer
linkedin
leader-logo
Ryan Garner
Chief Financial Officer
linkedin
Company data provided by crunchbase