Previous Job
Previous
SOC Analyst
Ref No.: 18-03049
Location: Herndon, Virginia
Position Type:Contract
Start Date: 03/20/2018
Role: SOC Analyst
Level: Tier 1 AND Tier 4 Analysts Needed! (Multiple Open Roles)
Location: Herndon, VA

The SOC Analyst shall be responsible for the following, but not limited to:
  • Analyze and respond to security events and incidents from SIEM, Firewall (FW), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Antivirus (AV), Network Access Control (NAC) and other client data sources.
  • Investigate security events forwarded from Level I Analysts and client for security risk.
  • Conduct tuning engagements with security engineers to develop/adjust SIEM rules and analyst response procedures.
  • Escalate incidents and act as a Security Incident Response Team Lead when necessary.
  • Enforce incident response SLAs Use strong TCP/IP networking skills to perform network analysis to isolate and diagnose.
  • Respond to inbound requests via phone and other electronic means for technical assistance Document actions in cases to effectively communicate information internally and to client.
  • Adhere to policies, procedures, and security practices. Resolve problems independently and understand escalation procedure.
  • Coordinate escalations and collaborate with internal technology teams to ensure timely resolution of issues.
  • Report common and repeat problems (trend analysis) to management and propose process and technical improvements.
  • Provide resolution plans for system and network issues.
  • Perform system maintenance and maintain current documentation.
  • Perform other duties as assigned. Shift-work assignment hours which will be based on typical rotating shifts to support security operations.
Requirements:
  • 1-3 years of security operations center environment - Information Security experience required.
  • Experience with a variety of operating systems including Windows, Linux or UNIX in a functional capacity
Preferred Skills/Experience:
  • CSIS, CEH, CSTA, CSTP, GCFE, CISSP, GCIH, GCIA, GPEN. One or more preferred
  • Excellent written and verbal communication skills required.
  • Must be able to communicate technical details clearly - McAfee Nitro, Splunk, McAfee ePO, Nessus or other like technology experience
  • IDS Log analysis skills
  • Packet Capture tools and analysis
  • Well known protocols and services (FTP, HTTP, SSH, SMB,DAP)