Yesterday
Unspecified
Mid Level Career (5+ yrs experience)
$100,000 - $125,000
IT - Security
Arlington, VA (On/Off-Site)
Job Description
• Security Monitoring & Alert Management: Continuously monitor system health and security alerts to detect potential threats in real time.
• Incident Response & Forensic Analysis: Conduct forensic analysis of digital evidence to identify intrusion patterns, malicious actors, and attack vectors.
• Threat Intelligence & Correlation: Correlate data from multiple sources (logs, threat feeds, network traffic) to identify emerging threats and attack trends.
• Risk Assessment & Mitigation: Identify security risks, vulnerabilities, and exposures; recommend remediation strategies to prevent future incidents.
• Interpret, analyze, and report all events and anomalies in accordance with computer network directives, including initiating, responding, and reporting discovered events.
• Reporting & Compliance: Generate detailed incident reports and briefings for stakeholders, including executive summaries and technical deep dives.
• Collaborate with federal agencies (CYBERCOM, NSA, FBI, DOJ, DHS) to review cybersecurity intelligence and align with national security protocols.
• Process Improvement Continuously refine SOC workflows, playbooks, and detection logic to adapt to evolving threats.
• Responsible for performing correlation activities and trend analysis to discover attack patterns and assess the risks and potential exposure of assets and develop and enhance correlation rules, logic, and analysis techniques for associating data.
-Possess 4+ years working in a SOC depending on labor category
- REQUIRED: Proficient using, downloading and reading Packet Capture (PCAP)
-REQUIRED: SolarWinds for network monitoring
-REQUIRED: Writing Queries for Splunk and watching/reporting on dashboard
-Understanding CJCSM Cat 1-9
-Security Plus CE or equivalent
-Comfortable fitting into a 6-2, 2-10,10-6 shift
• Security Monitoring & Alert Management: Continuously monitor system health and security alerts to detect potential threats in real time.
• Incident Response & Forensic Analysis: Conduct forensic analysis of digital evidence to identify intrusion patterns, malicious actors, and attack vectors.
• Threat Intelligence & Correlation: Correlate data from multiple sources (logs, threat feeds, network traffic) to identify emerging threats and attack trends.
• Risk Assessment & Mitigation: Identify security risks, vulnerabilities, and exposures; recommend remediation strategies to prevent future incidents.
• Interpret, analyze, and report all events and anomalies in accordance with computer network directives, including initiating, responding, and reporting discovered events.
• Reporting & Compliance: Generate detailed incident reports and briefings for stakeholders, including executive summaries and technical deep dives.
• Collaborate with federal agencies (CYBERCOM, NSA, FBI, DOJ, DHS) to review cybersecurity intelligence and align with national security protocols.
• Process Improvement Continuously refine SOC workflows, playbooks, and detection logic to adapt to evolving threats.
• Responsible for performing correlation activities and trend analysis to discover attack patterns and assess the risks and potential exposure of assets and develop and enhance correlation rules, logic, and analysis techniques for associating data.
-Possess 4+ years working in a SOC depending on labor category
- REQUIRED: Proficient using, downloading and reading Packet Capture (PCAP)
-REQUIRED: SolarWinds for network monitoring
-REQUIRED: Writing Queries for Splunk and watching/reporting on dashboard
-Understanding CJCSM Cat 1-9
-Security Plus CE or equivalent
-Comfortable fitting into a 6-2, 2-10,10-6 shift
group id: 10112344
Defining Company Culture