Enable job alerts via email!
Boost your interview chances
Create a job specific, tailored resume for higher success rate.
A leading company seeks a SOC Analyst in Washington, D.C. This role involves analyzing and responding to security incidents using SQL queries and various tools. Ideal candidates should have expertise in incident detection and digital forensics. Full-time commitment with opportunities for advanced career development within the field.
Get AI-powered advice on this job and more exclusive features.
Direct message the job poster from Flexton Inc.
Exp : professional experience in incident detection and response, malware analysis, or digital forensics
Job Description
A SOC Analyst will work with tools and technologies like SQL Queries, EDR (Endpoint Detection and Response), Logs, Unix, and Shell Scripting will use these tools to detect, analyze, and respond to security incidents.
Doesn’t need to be great and have expertise in java / Python – But be able to reach the root cause of the incident and find the anomaly from thousands of logs
The role involves SQL queries. When an incident occurs the SOC Analyst will check logs from Multiple machines and determine the anomaly. The SOC analyst might have to check logs from any system on the network windows/Unix.
Roles and Responsibilities:
• Security Operations Center (SOC) support, cyber analysis, scripting, and automation.
• Cyber analysis Splunk Queries and SQL for analysis of log data and Analytics.
• Identify and mitigate information-security threats.
• Solve complex security problems
• Defend and respond daily to keep eBay’s critical information assets away from threats and hackers.
• Extensive experience providing analysis and trending of security log data from many heterogeneous security devices.
Detail job description:
Must demonstrate expert knowledge in one (1) or more of the following areas:
• Incident Response, Digital Forensics, Monitoring and Detection, Cyber Intelligence Analysis
• Core Job Functions Include:
• Investigations – Investigating computer and information security incidents to determine extent of compromise to information and automated information systems
• Escalations – Responding to escalated events from security tooling to develop/execute security controls, Defense/countermeasures to prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce, and web-based systems.
• Research – Researching attempted or successful efforts to compromise systems security and designs countermeasures.
• Education - maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.
• Communications – Provides information and updates to shift leads & leadership, creates pass-downs for next shift, work closely with supporting teams, provide feedback for new security policy and standards, engage with other teams and adjacencies through email and conference calls.
• Digital Forensics – As it relates to information systems, performs HR investigations and legal holds in a forensically sound manner. Consults with HR and legal subject matter experts to adhere to local country law
• Coverage – Must be willing to perform shift work, weekends, and holidays as well as participate in a rotating shift consisting of four (4) 10-hour shifts with four days on, three (3) days off and possible rotations across Day, Swing, and Graveyard shifts as needed.
Referrals increase your chances of interviewing at Flexton Inc. by 2x
Washington, DC $92,000.00-$130,000.00 2 days ago
Washington, DC $55,000.00-$85,000.00 6 hours ago
Washington, DC $90,000.00-$110,000.00 1 week ago
Washington, DC $75,000.00-$85,000.00 2 weeks ago
District of Columbia, United States 2 weeks ago
Washington, DC $124,400.00-$232,700.00 6 hours ago
Washington, DC $132,480.00-$242,820.00 3 days ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.