Enable job alerts via email!

Senior SOC Analyst

Fusion Technology

Kirkland (WA)

On-site

USD 90,000 - 120,000

Full time

12 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

Fusion Technology is seeking a Sr Security Analyst to monitor and analyze security events for the US Government. The role requires a DOD Secret Clearance and 5 years of experience in security event analysis within a SOC or NOC environment. The analyst will be responsible for investigating suspicious activities and ensuring the integrity of security systems. Fusion Technology offers competitive compensation and a comprehensive benefits package.

Benefits

Best-in-class matching 401K program
Comprehensive healthcare plan
Paid certifications and training
Vision and dental plans
Life insurance
Short- and long-term disability
Personal leave

Qualifications

  • 5 years of experience working in a SOC or NOC environment.
  • Active DOD Secret Security Clearance.
  • Experience with various operating systems and network protocols.

Responsibilities

  • Monitor and analyze security events and alerts 24/7.
  • Document and investigate suspicious or malicious activity.
  • Analyze logs from various devices and maintain incident records.

Skills

Security event analysis
Network communications
Operating systems knowledge
Log analysis
Adversarial tactics knowledge

Education

High School Diploma

Tools

Splunk
SIEM platforms

Job description

Who is Fusion Technology?

Fusion Technology is a performance-driven HUBZone Small Business concern residing in the heart of the beautiful mountainsides of West Virginia, steps away from the Federal Bureau of Investigation's Criminal Justice Information Services Division's Headquarters. Founded in 2007 by an Engineer-by-trade, Fusion Technology dedicates our valuable resources to providing comprehensive IT services and solutions to mission-critical US Government programs and the Intel Community.

Position Location: Herndon, Virginia (onsite required), will require shift work

Who are you?

Security-cleared Professional: You have made it through the process of receiving a United States government security clearance - congratulations! We know you are a trustworthy intel professional because you have an active DOD Secret Security Clearance or an Interim DOD Secret Clearance.

Education is important to us: You have a High School Diploma with 5 years of experience working in a SOC or NOC environment performing security event analysis.

Experience is important to us:

  • Working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks
  • Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.)
  • Must be capable of analyzing security logs and events from the following types of devices such as, but not limited to: Firewalls (FWs), Intrusion Detection Sensors/Intrusion Prevention Sensors (IDS/IPS), Host-based Intrusion Detection System/ Host-based Intrusion Prevention System (HIDS/HIPS), proxy/web filter, vulnerability scans, routers, router Internet Protocol (IP) accounting systems (i.e., Cisco NetFlow), Virtual Private Network (VPN) gateways/concentrators, server event logs, e-mail and host anti-virus, desktop security monitoring agents, anti-virus servers, IP services (i.e. Domain Name System (DNS) Services, Dynamic Host Configuration Protocol (DHCP), network address translation devices, MDM (e.g. cellphones), Public Key Infrastructure (PKI), and cloud security infrastructure (e.g. Amazon Web Services (AWS), Azure, Oracle, Salesforce, etc.)
  • Advanced knowledge of common adversarial tactics, techniques, and procedures (TTPs)
  • Ability to obtain suitability clearance from the Agency

Preferred Skills:

  • Ability and prior experience with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents. This includes the identification of malicious code present within a computer system as well identification of malicious activities that are present within a computer system and/or enterprise network
  • Experience with Splunk query language, PCAP analysis, Tanium threat response, IDS/IPS/firewall/security configurations and signature development
  • Experience working with a ticket management system to collect, document and maintain information pertinent to security investigations and incidents
  • Excellent verbal and written communications skills
  • Experience in monitoring the operational status of monitoring components and escalating and reporting outages of the components
  • Conceptual understanding of Windows Active Directory is also desired
  • Experience working with various event logging systems and must be proficient in the review of security event log analysis. Previous experience with SIEM platforms that perform log collection, analysis, correlation, and alerting is also preferred
  • Experience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment

Certifications: CYSA+, CEH, or equivalent

What you'll do:

The Sr Security Analyst will monitor and analyze security events and alerts reported on a 24x7 basis to identify and investigate suspicious or malicious activity, or other cyber events which violate policy. The analyst will be responsible for analyzing logs and events from any other device types which may send logs or events to the SOC in the future. Non-traditional device feeds will deliver data to the SIEM architecture (e.g., Human Resources (HR) data, badging information, and physical security devices, etc.). The analyst will provide documentation detailing any additional information collected and maintained for each security investigation. The analyst will record all artifacts (i.e. emails, logs, documents, Uniform Resource Locators (URLs), screenshots, etc.) associated with all security events and incident investigations within the SOC's incident and tracking application.

What matters to you matters to us.

Fusion Technology values its employees and works hard to ensure proper care for them and their families. We desire to compensate employees in a competitive, motivational, fair, and equitable way with other employers in the marketplace. Salary is only one component of employee compensation but an integral part of recruiting and retaining qualified employees. However, at Fusion Technology, we take a comprehensive approach and consider each employee's needs to tailor a compensation plan that provides financial security and peace of mind. Our competitive package includes a best-in-class matching 401K program, a comprehensive healthcare plan through Cigna, a competitive employer contribution to a health savings account, vision and dental plans, life insurance, short- and long-term disability, and personal leave, in addition to paid certifications and training.

Fusion Technology LLC is an Equal Opportunity Employer. We respect and seek to empower each individual and support the diverse cultures, perspectives, skills, and experiences within our workforce.Qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law.


Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Senior SOC Analyst

Inmar

Remote

USD 90,000 - 130,000

4 days ago
Be an early applicant

Senior Third Party Risk Management Analyst / PCI / SOC

Motion Recruitment

Seattle

Remote

USD 90,000 - 130,000

8 days ago

Senior SOC Analyst/Lead @ ECS

Cyber Crime

Mississippi

Remote

USD 90,000 - 130,000

2 days ago
Be an early applicant

Senior SOC Analyst

OpenText

Remote

USD 60,000 - 100,000

30+ days ago

SOC Analyst - Remote

Lensa

Remote

USD 72,000 - 115,000

5 days ago
Be an early applicant

Night Shift SoC Analyst (Intermediate)

Federal Reserve System

El Paso

Remote

USD 87,000 - 121,000

2 days ago
Be an early applicant

SOC Analyst

SS&C Technologies

New Jersey

Remote

USD 90,000 - 130,000

4 days ago
Be an early applicant

Junior SOC Analyst

SS&C Technologies

New Jersey

Remote

USD 80,000 - 120,000

5 days ago
Be an early applicant

SOC Tier 2 (L2) Analyst

Amgen

Remote

USD 80,000 - 120,000

4 days ago
Be an early applicant