Yesterday
Unspecified
IT - Security
San Miguel, CA (On-Site/Office)
Local Defender / Security Operations Center SOC Analyst
OASYS, INC., a Leading-Edge Government contractor, is seeking applicants for a Local Defender SOC Analyst position to support our Army customer at Camp Roberts in San Miguel, California.
Job Responsibilities include: Supports our Army customer by providing a critical cybersecurity role through system monitoring and analysis support for the detection of cyber incidents and provides recommendations on how to correct findings. This role combines the duties of a Security Operations Center (SOC) Analyst and Threat Analyst to ensure a holistic defense against emerging threats. Performs tasks in a variety of areas to include:
Monitoring security logs, analyzing and reporting cyber incidents, reviewing Common Vulnerabilities and Exposures (CVEs), and implementing directives from NETCOM (e.g., Cyber Tasking Orders - CTO).
Work is performed on-site with occasional on-call duties for critical incidents in a collaborative, demanding environment requiring attention to emerging threats and vulnerabilities.
Monitor and analyze security events and alerts generated by SIEM platforms, firewalls, IDS/IPS, and endpoint detection tools to identify potential threats and anomalous behavior.
Submits and tracks all service tickets submitted internally and externally for Operational Technology (OT) systems.
Analyze potential security incidents and investigate to determine the scope, impact, and root cause, and recommend effective remediation strategies, based on SIEM data analysis, in accordance with SLAs and OLAs.
Conduct research on the latest organization's environment threat vectors, attack methodologies, and adversarial tactics, techniques, and procedures (TTPs).
Support the configuration, tuning, and optimization of security monitoring tools, including SIEM and threat detection platforms.
Generate detailed and actionable reports for leadership from SIEM platforms summarizing identified threats, incidents, and remediation steps.
Minimum Requirements:
Bachelors Degree or higher, additional years of experience may be substituted for degree
Minimum of 10 years of work-related experience.
Security+, or other DoD 8570/8140 IAT Level II certification.
Ability to work on-site daily.
Proficiency in analyzing security events, logs, and alerts from various security tools (e.g., SIEM, firewalls, IDS/IPS).
Familiarity with CVEs, threat intelligence frameworks (e.g., MITRE ATT&CK), and vulnerability management practices.
Knowledge of NETCOM policies, Cyber Tasking Orders (CTOs), and cybersecurity compliance requirements.
A high-level performer with the ability to be proactive and respond rapidly to changing conditions in a fast-paced environment
May require CONUS and/or OCONUS travel to customer sites,
OASYS, INC., a Leading-Edge Government contractor, is seeking applicants for a Local Defender SOC Analyst position to support our Army customer at Camp Roberts in San Miguel, California.
Job Responsibilities include: Supports our Army customer by providing a critical cybersecurity role through system monitoring and analysis support for the detection of cyber incidents and provides recommendations on how to correct findings. This role combines the duties of a Security Operations Center (SOC) Analyst and Threat Analyst to ensure a holistic defense against emerging threats. Performs tasks in a variety of areas to include:
Monitoring security logs, analyzing and reporting cyber incidents, reviewing Common Vulnerabilities and Exposures (CVEs), and implementing directives from NETCOM (e.g., Cyber Tasking Orders - CTO).
Work is performed on-site with occasional on-call duties for critical incidents in a collaborative, demanding environment requiring attention to emerging threats and vulnerabilities.
Monitor and analyze security events and alerts generated by SIEM platforms, firewalls, IDS/IPS, and endpoint detection tools to identify potential threats and anomalous behavior.
Submits and tracks all service tickets submitted internally and externally for Operational Technology (OT) systems.
Analyze potential security incidents and investigate to determine the scope, impact, and root cause, and recommend effective remediation strategies, based on SIEM data analysis, in accordance with SLAs and OLAs.
Conduct research on the latest organization's environment threat vectors, attack methodologies, and adversarial tactics, techniques, and procedures (TTPs).
Support the configuration, tuning, and optimization of security monitoring tools, including SIEM and threat detection platforms.
Generate detailed and actionable reports for leadership from SIEM platforms summarizing identified threats, incidents, and remediation steps.
Minimum Requirements:
Bachelors Degree or higher, additional years of experience may be substituted for degree
Minimum of 10 years of work-related experience.
Security+, or other DoD 8570/8140 IAT Level II certification.
Ability to work on-site daily.
Proficiency in analyzing security events, logs, and alerts from various security tools (e.g., SIEM, firewalls, IDS/IPS).
Familiarity with CVEs, threat intelligence frameworks (e.g., MITRE ATT&CK), and vulnerability management practices.
Knowledge of NETCOM policies, Cyber Tasking Orders (CTOs), and cybersecurity compliance requirements.
A high-level performer with the ability to be proactive and respond rapidly to changing conditions in a fast-paced environment
May require CONUS and/or OCONUS travel to customer sites,
group id: 90964053