Job ID: SOC Analyst -Tier *** ).
Rate may vary depending on candidate preference for either w-2 (benefits or
no benefits) or must have a 'LLC' -limited liability corporation.
Location:Washington, DC
Years of experience:6+ years' experience.
Duration: *** +
Number of positions:1
Interviews:Either webcam or in-person.
Job Description:
The SOC Analyst is a Tier 2 tech resource responsible for monitoring,
detecting, analyzing, remediating, and reporting on cyber events and
incidents impacting the tech infrastructure of the District of Columbia.
Serves as advanced escalation point.
Summary
SOC ANALYST - TIER 2
The SOC Analyst - Tier 2 is cybersecurity technical resource responsible for
providing technical analytical guidance to a team of Tier 1 SOC Analysts to
monitor, detect, analyze, remediate, and report on cybersecurity events and
incidents impacting the technology infrastructure of the Government of the
District of Columbia. The ideal candidate will have an advanced technical
background with experience in an enterprise successfully leading a SOC unit
or area of responsibility for analysis and correlation of cybersecurity
event, log, and alert data. The candidate will be skilled in understanding,
recognition, and root-cause detection of cybersecurity exploits,
vulnerabilities, and intrusions in host and network-based systems.
SPECIFIC TASKS
Utilize technical background and experience in information technology and
incident response handling to scrutinize and provide corrective analysis to
escalated cybersecurity events from Tier 1 SOC Analysts-distinguishing these
events from benign activities, and escalating confirmed incidents to Tier 3
Analysts.
Provide in-depth cybersecurity analysis, and trending/correlation of large
data-sets such as logs, event data, and alerts from diverse network devices
and applications within the enterprise to identify and troubleshoot specific
cybersecurity incidents, and make sound technical recommendations that
enable expeditious remediation.
Proactively search through log, network, and system data to find and
identify undetected threats.
Support security tool/application tuning engagements, using McAfee ESM and
McAfee ePO, with analysts and engineers to develop/adjust rules and
analyze/develop related response procedures, and reduce false-positives from
alerting.
Identify and ingest indicators of compromise (IOC's) (e.g., malicious
IPs/URLs, etc.) into network security tools/applications to protect the
Government of the District of Columbia network.
Quality-proof technical advisories and assessments prior to release from the
SOC.
Coordinate with and provide in-d...