SOC Analyst -Tier 2 Job requirement

JOB ID:SOC Analyst -Tier *** ).

Rate may vary depending on candidate preference for either w-2 (benefits or

no benefits) or must have a 'LLC' -limited liability corporation.

Location:Washington, DC

Years of experience:6+ years' experience.

Duration: *** +

Number of positions:1

Interviews:Either WebCam or in-person.

JOB DESCRIPTION:

The SOC Analyst is a tier 2 tech resource responsible for monitoring,

detecting, analyzing, remediating, and reporting on cyber events and

incidents impacting the tech infrastructure of the District of Columbia.

Serves as advanced escalation point.

Summary

SOC ANALYST - TIER 2

The SOC Analyst - Tier 2 is cybersecurity technical resource responsible for

providing technical analytical guidance to a team of Tier 1 SOC Analysts to

monitor, detect, analyze, remediate, and report on cybersecurity events and

incidents impacting the technology infrastructure of the Government of the

District of Columbia. The ideal candidate will have an advanced technical

background with experience in an enterprise successfully leading a SOC unit

or area of responsibility for analysis and correlation of cybersecurity

event, log, and alert data. The candidate will be skilled in understanding,

recognition, and root-cause detection of cybersecurity exploits,

vulnerabilities, and intrusions in host and network-based systems.

SPECIFIC TASKS

Utilize technical background and experience in information

technology and incident response handling to scrutinize and provide

corrective analysis to escalated cybersecurity events from Tier 1 SOC

Analysts-distinguishing these events from benign activities, and escalating

confirmed incidents to Tier 3 Analysts.

Provide in-depth cybersecurity analysis, and

trending/correlation of large data-sets such as logs, event data, and alerts

from diverse network devices and applications within the enterprise to

identify and troubleshoot specific cybersecurity incidents, and make sound

technical recommendations that enable expeditious remediation.

Proactively search through log, network, and system data to

find and identify undetected threats.

Support security tool/application tuning engagements, using McAfee ESM

and McAfee ePO, with analysts and engineers to develop/adjust rules and

analyze/develop related response procedures, and reduce false-positives from

alerting.

Identify and ingest indicators of compromise (IOC's) (e.g.,

malicious IPs/URLs, etc.) into network security tools/applications to

protect the Government of the District of Columbia network.

Quality-proof technical advisories and assessments prior to

release from the SOC.

&nbs...

See full