SOC Analystother related Employment listings - Washington, DC at Geebo

SOC Analyst

Reference # :
20-01002 Title :
SOC Analyst #33957 Location :
Washington, DC Position Type :
Contract Experience Level :
Start Date / End Date :
11/17/2020 / 06/06/2021 Description Title:
Sr.
Incident Response Analyst Location:
Washington, DC Clearance:
Fully adjudicated Secret clearance (Top Secret ideal) Candidate Daily
Responsibilities:
Respond to cyber incidents, including responding to IR phone calls and emails, and preparing situational awareness reports for DOC, its bureaus, and/or DOC management Act as main investigators for potential incidents identified by SOC analysts Investigate phishing and self-identified potential cyber threats (phishing emails sent to the CIRT) Work with DOC users to analyze, triage, contain, and remediate security incidents Track incident managements thoroughly and communicate with end users and senior CIO officials effectively Participate regularly in SOC working group sessions, to include idea generation for new content rules for security alerting and reduction of false positives.
Collaborate across organizational lines and develop depth in your desired cyber discipline and/or technologies Follow documented procedures yet have an eye towards process improvement/effectivity Knowledgeable on multiple technology and system types Able to articulate the incident response lifecycle Manages and responds to computer security incidents that involve enterprise systems and data including personally identifiable information (PII) breaches Detect, collect and report cybersecurity incidents Experience detecting and remediate malicious codes Helps improve the overall security posture by independently verifying the security of enterprise systems, and to ensure the timely dissemination of security information to the appropriate stakeholders Analyze firewall logs, Full Packet Capture (PCAP), IDS alerts, Anti-malware alerts, Host Intrusion Prevent System (HIPS), and server and application logs to investigate events and incidents for anomalous activity and produce reports of findings Conduct reviews and analysis of proxy logs, Microsoft Windows and Active Directory logs, Orchestrator logs, and malicious code to identify, contain, eradicate, and ensure recovery from incidents Features of the candidate/job:
Inquisitive, problem-solving oriented Not 24x7 shifts, but it does cover 7am-7pm between DC and WV locations.
On-call rotation for SOC escalation as needed for night/weekends (coordinated with manager each month for the on-call schedule) Mid IR (Tier II):
3-7 years of SOC/IR experience Sr IR (Tier III):
7
years of SOC/IR experience Solid understanding of cyber landscape
typical threat vectors Candidate Preferred
Qualifications:
Experience with multiple types of attack types and attack vectors Ability to perform deep dive investigations from start to finish of a security incident using data from both host based and network based devices.
Ability to forensically investigate both Windows and Linux devices for compromise.
Ability to analyze malicious files through code analysis/reverse engineering.
Ability to perform introspection of incident for after action reports to both technical and non-technical staff Up to date understanding of threat vectors, attacker methodology and how they tie into the cyber kill chain or Telecommunication & CK framework.
Specialized Skill Areas:
Digital Forensics Automation/Scripting SIEM Exposure Incident response triage Malware reverse engineering Threat hunting Must have at least one of the following certifications:
CERT Certified Computer Security Incident Handler ECC CEH (Electronic Commerce Council Certified Ethical Hacker) GCIH (GIAC Certified Incident Handler) GISF (GIAC Information Security Fundamentals) CISSP (ISC2 Certified Information System Security Professional) SCNP (Security Certified Network Professional) SCNA (Security Certified Network Architect) Clearance Requirement:
Must be US Citizen Minimum fully adjudicated Secret and Interim Top Secret clearance #CB RCM Technologies is a leading provider of IT Business Solutions and Engineering Services to over 1,000 clients in the commercial and government sectors.
RCM partners with clients to define implement and manage a broad range of technologies across multiple platforms, systems, and networks.
Our broad geographic presence ensures that a proven and reliable tactical and strategic capability is available and deployable virtually everywhere in North America.
RCMTechnologies, (USA) Inc.
is an Equal Opportunity Employer M/F/D/V.
RCMT encourages applicants of all ages.
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.