SOC Analyst jobs in United States
cer-icon
Apply on Employer Site
company-logo

KeenLogic ยท 5 hours ago

SOC Analyst

KeenLogic is seeking to hire an Information Security Operation Analyst (SOC Analyst) to join our team at the Drug Enforcement Administration. The role focuses on cybersecurity incident detection and response, requiring the analyst to design and implement solutions for protecting sensitive information.

Information Technology
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Perform network security monitoring and incident response for a large organization
Coordinate with other government agencies to record and report incidents
Maintain records of security monitoring and incident response activities using case management and ticketing technologies
Monitor SIEM tools to identify security issues for remediation
Recognize intrusion attempts and compromises through detailed analysis of event data
Communicate alerts regarding intrusions and compromises to networks, applications, and operating systems
Assist with implementation of countermeasures or mitigating controls
Support threat data analysis from classified, proprietary, and open-source resources
Support Team Lead in developing recommendations for changes to Standard Operating Procedures
Monitor and review logs and create new security tool signatures
Perform intrusion detection, log and audit management, vulnerability assessment, compliance management, and security configuration
Install, configure, troubleshoot, and maintain server configurations (hardware and software)
Manage accounts, security devices, patches, access control, and passwords
Analyze collected data to identify vulnerabilities and exploitation potential
Support development of security countermeasures
Identify network and OS vulnerabilities and recommend countermeasures
Support deployment and integration of security tools
Prepare written reports and provide verbal information security briefings
Investigate, monitor, analyze, and report on security incidents
Respond to crisis or urgent situations to mitigate threats
Apply mitigation, preparedness, response, and recovery approaches
Provide incident handling support for detection, analysis, coordination, and response
Actively monitor and remediate unauthorized activities
Monitor intrusion detection sensors and log collection systems
Ensure security systems are operating at maximum performance and availability
Analyze computer security threat information from multiple sources and agencies

Qualification

CybersecurityIncident ResponseInformation System SecurityComputer ForensicsSIEM toolsVulnerability AssessmentThreat HuntingCybersecurity ToolsCommunication SkillsTeam Collaboration

Required

Must be a U.S. citizen with an active Secret or Top Secret clearance
Must be eligible for a Top Secret clearance if requested
Bachelor's degree from an accredited college or university in one or more of the following disciplines (or equivalent documented formal training): Computer Science, Information Systems, Engineering, Business, Physical Science, Other technology-related disciplines
Any combination of certificates such as Microsoft MCSE or Cisco CCNA, CCDA, or CCNP may be considered equivalent to two (2) years of general IT experience
Certificates under DoD IAM, IAT, IASAE, or CSSP Levels I, II, or III may be considered equivalent to two (2) years of information security experience
3+ years of documented work experience performing any combination of: Information System Security, Security Assessment & Authorization, Cybersecurity, Computer Forensics, Insider Threat

Preferred

CompTIA CySA+ cybersecurity analyst certification
Cybersecurity incident response and detection experience
Experience in cybersecurity event triaging using the seven steps of the Incident Response Process (IRP)
Security Operations Center (SOC) experience
Conducting cyber event investigations to determine root cause and identify true/false positives
Creating rules, thresholds, and policies for cybersecurity tools (IOCs/IOAs)
Verification and validation, containment, eradication, and recovery from incidents
Experience validating hashes, malicious IPs, and URLs
Experience investigating malicious emails and payloads
Requirements analysis, program development, architecture, engineering, integration, and deployment of IT products in an enterprise environment
Ability to create and monitor multiple cybersecurity tool dashboards
Open-source intelligence gathering experience
Threat hunting and vulnerability assessment experience
Knowledge of SIEM tools and query generation

Benefits

Health, dental, and vision benefits
PTO
401(k)
Life insurance

Company

KeenLogic

twittertwitter
company-logo
KeenLogic is a transformative and world-class IT Services company based in Maryland.

Funding

Current Stage
Growth Stage

Leadership Team

leader-logo
Matthew Totsch
CEO and Founder
linkedin
leader-logo
J.G. Meyer
President & Chief Operating Officer
linkedin
Company data provided by crunchbase