SOC Tier2 Analyst

Base One Technologies

Yesterday
Secret
Mid Level Career (5+ yrs experience)
$90,000 - $100,000
No Traveling
Unspecified
IT - Security
Washing, DC (On-Site/Office)

Our DC metro based client is looking for Tier 2 SOC Analyst. Local candidates are preferred. In person meeting is required prior hiring. US CITIZENSHIP AND ACTIVE TS ARE required for these openings.


Tier 2 Analyst
All Tier 2 Analyst candidates shall have a minimum of five (5) years of professional experience in incident detection and response, malware analysis, or cyber forensics, or a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field with three (3) years of experience in incident detection and response, malware analysis, or cyber forensics. Candidates must have extensive experience working with various security methodologies and processes, advanced knowledge of TCP/IP protocols, experience configuring and implementing various of technical security solutions, extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices, and must possess expert knowledge in two or more of the following areas related to cybersecurity:
• Vulnerability Assessment
• Intrusion Prevention and Detection
• Access Control and Authorization
• Policy Enforcement
• Application Security
• Protocol Analysis
• Firewall Management
• Incident Response
• Encryption
• Web-filtering
• Advanced Threat Protection Of the years of experience described above, Tier 2 Analyst candidates must have three years of the following specialized experience:


Monitoring and Detection Analyst
Shall have a minimum of three (3) years of professional experience in cybersecurity, information risk management, or information systems risk assessment, and must be knowledgeable in many areas such as: Vulnerability Assessments, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Data Loss Prevention, Encryption, Two-Factor Authentication, Web-filtering, and Advanced Threat Protection.


Incident Response Analyst
Shall have a minimum of three (3) years of professional experience responding to information system security incidents and an ability to use the DHS furnished toolset to identify and determine root causes of incidents and provide any required documentation and possible evidence to authorized personnel who carry legal or investigative authorities.


Cyber Intelligence Analyst
Shall have at least three (3) years of professional experience in incident detection and response and/or cyber intelligence analysis, and a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field.


Digital Media Forensics Analyst
Shall have a minimum of five (5) years of professional experience performing digital media forensic analysis, static malware code disassembly/analysis, and/or runtime malware code analysis.


Email Security Analyst:
Shall have a minimum of five (5) years of professional experience in email security, which includes identification of phishing attempts, malware detonation, and knowledge of the DHS SOC email analysis toolset.


Incident Response Analyst
Shall have a minimum of five (5) years of professional experience responding to information system security incidents. Ability to use the DHS furnished toolset to identify and determine root causes of incidents and provide any required documentation and possible evidence to security investigators.

If you are interested in these openings. Please forward
group id: baseone
N
Name HiddenSME-IT/Technical /Govt Security Cleared IT Recruiting

Match Score

Powered by IntelliSearch™
Create an account or Login to see how closely you match to this job!

Similar Jobs


Job Category
IT - Security
Clearance Level
Secret