Enable job alerts via email!
Boost your interview chances
Create a job specific, tailored resume for higher success rate.
A leading company is seeking a CSOC Analyst II to enhance security operations for their federal customer. The role involves monitoring security incidents across multiple platforms and requires a strong background in IT security and network traffic analysis. Candidates should possess a relevant degree and certification, along with necessary clearance eligibility.
Falls Church, VA Contract On-Site Flexibility/Remote: 100%
PlanIT Group is seeking aCSOC Analyst II to support our Federal customer in the Washington, DC area. The ideal candidate will be responsible for monitoring, reviewing, and responding to security alerts and incidents across multiple platforms including Microsoft Defender for Cloud Apps, Defender for Endpoint, Defender XDR, Defender for Office 365, Azure Entra ID, and Google Cloud Security Command Center (SCC). Duties include performing threat detection and analysis, investigating suspicious activity, coordinating incident response efforts, and implementing remediation actions. The role also involves tuning security policies, maintaining visibility into cloud and endpoint environments, and supporting continuous improvement of the organization’s security posture
Job Title:CSOC Analyst II
Location:Remote
Duration:One year plus annual extensions
CSOC Analyst II
Key Responsibilities:
• Identification of Cybersecurity problems which may require mitigating controls
• Analyze network traffic to identify exploit or intrusion related attempts
• Recommend detection mechanisms for exploit and or intrusion related attempts
• Provide subject matter expertise on network-based attacks, network traffic analysis, and intrusion methodologies
• Escalate items which require further investigation to other members of the Threat Management team
• Execute operational processes in support of response efforts to identified security incidents
• Responsible for monitoring, reviewing, and responding to security alerts and incidents across multiple platforms including Microsoft Defender for Cloud Apps, Defender for Endpoint, Defender XDR, Defender for Office 365, Azure Entra ID, and Google Cloud Security Command Center (SCC). Duties include performing threat detection and analysis, investigating suspicious activity, coordinating incident response efforts, and implementing remediation actions. The role also involves tuning security policies, maintaining visibility into cloud and endpoint environments, and supporting continuous improvement of the organization’s security posture
Job responsibilities will include:
• Participates in a team of Security operations engineers investigating alerts, anomalies, errors, intrusions, malware, etc. to identify the responsible, determine remediation, and recommend security improvements
• Follows precise analytical paths to determine the nature and extent of problems being reported by tools, e-mails, etc
• Follows strict guidance on reporting requirements
• Keeps management informed with precise, unvarnished information about security posture and events
• Promotes standards-based workflow both internally and in coordinating with CISA
• Engages with other internal and external parties to get and share information to improve processes and security posture
• Guide team efforts
• Communicates to leadership
• Leads analyzing/investigating reports or anomalies
Requirements:
• Must be eligible to obtain a sensitive clearance – Position of Public Trust – and may be required to obtain a higher security clearance
• Preferred 3+ years IT security experience
• Preferred 2+ years’ experience in network traffic analysis
• Strong working knowledge of:
• TCP/IP Fundamentals
• Network Level Exploits
• Excellent oral and written communication skills
• Excellent interpersonal and organizational skills
• Strong understanding of IDS/IPS technologies, trends, vendors, processes and methodologies
• Strong understanding of common IDS/IPS architectures and implementations
• Strong understanding of IDS/IPS signatures, content creation and signature characteristics including both signature and anomaly-based analysis and detection
• Azure and GCP O365/Microsoft 365 experience required
Desired Skills:
• Splunk experience, developing queries
• Cloud monitoring experience
• Excellent writing skills
Required Education:
• Bachelor's OR Master's Degree in Computer Science, Information Systems, or other related field. Or equivalent work experience.
Certifications (one or more desired):
• Comp TIA Security+, CISSP, CISA, CISM, GIAC, RHCE.
Additional Provisions:
• Must be able to obtain a Position of Public Trust Clearance
• Pass both a client mandated clearance process to include drug screening, criminal history check and credit check.
• All candidates must be a US Citizen or US Permanent Residents only
• Candidate must have lived in the United States for the past 5 years.
• Cannot have more than 6 months travel outside the United States within the last five years. Military Service excluded. (Exception does not include military family members.)