Job Details
Sr. SOC Analyst
Description
Looking for an exciting opportunity to make an impact as a Senior Security Operation Center Analyst?
1901 Group (A Leidos Company) has an exciting Senior SOC Analyst position located in Woodlawn MD with opportunities to work a hybrid schedule at home as well as the office.
Our new Senior Security Operations Center Analyst will work with an elite team of IT professionals to maintain an optimal environment for critical systems. We are looking to hire a Senior SOC Analyst to provide a full range of cyber security services with a focus on deception practices for developing detection methods that deceive attackers into interacting with decoys and other deception mechanisms.
Primary Responsibilities:
- Perform hunting for malicious activity across the network and digital assets
- Respond to computer security incidents and conduct threat analysis
- Identify and act on malicious or anomalous activity
- Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network
- Perform detailed investigation and response activities for potential security incidents
- Provide accurate and priority driven analysis on cyber activity/threats
- Perform payload analysis of packets
- Recommends implementation of countermeasures or mitigating controls
- Ensures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment
- Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity
- Develop innovative monitoring and detection solutions using client tools and other skillsets such as scripting and content development
- Mentor junior staff in cybersecurity techniques and processes
- Create and continuously improve standard operating procedures used by the SOC
- Resolve or coordinate the resolution of cyber security events
- Monitor incoming event queues for potential security incidents
- Create, manage, and dispatch incident tickets
- Monitor external event sources for security intelligence and actionable incidents
- Maintain incident logs with relevant activity
- Document investigation results, ensuring relevant details are passed to SOC Lead, Incident Management team and stakeholders
- Participate in root cause analysis or lessons learned sessions
Basic Qualifications:
- Bachelor’s 5+ years of Information Technology experience, with at least 4 years of experience in information security working within security operations
- In-depth knowledge of the US-CERT Federal Incident Notification Guidelines
- Working knowledge of TrendMicro and McAfee host-based solutions
- Career proven knowledge of log, network, and system forensic investigation techniques
- Significant experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs
- Intelligence driven defense utilizing the Cyber Kill Chain (CKC)
- Knowledge of diverse operating systems, networking protocols, systems administration, and security technologies
- Knowledge of TCP/IP Networking and knowledge of the OSI model
- Experience creating actionable content for a diverse range of commercial security tools and/or SIEM technologies
- Significant experience monitoring threats via a SIEM console
- Excellent problem solving, critical thinking, and analytical skills with the ability to de-construct problems
- Strong customer service skills and decision-making skills
- Must have the ability to obtains public trust clearance prior to start, must be a US Citizen
Preferred Qualifications:
- Experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs
- Ability to think creatively and implement innovative solutions
- Familiar with AWS cloud environments, architecture, and services
- Familiarity with the MITRE ATT&CK framework
- Working knowledge of client infrastructure
- Experience with proprietary and open-source deception technologies and platforms
- Experience with SIEM technologies such as Splunk
- Minimum 4-years of experience in SOC/CIRT with 2-3 years of specific experience as a senior level analyst, Lead Analyst or Subject Matter Expert (SME).
- Experience with Splunk, RSA Security Analytics and Akamai Web Application Firewall
- Significant experience with packet analysis (Wireshark) and Malware analysis
Mid Shift (Sunday-Wednesday, 6am-4pm EST).
Pay Range:
Pay Range $78,000.00 - $141,000.00The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.