Enable job alerts via email!
Boost your interview chances
Create a job specific, tailored resume for higher success rate.
An established industry player is seeking a Senior SOC Security Analyst to join their team. This role involves monitoring and responding to alerts, investigating incidents, and ensuring the security of critical systems. Candidates should have a strong background in network intrusion detection and experience with SIEM tools. The position offers a blend of onsite and remote work, with various shift options available. The company provides competitive benefits, including paid time off, health insurance, and a 401(k) plan. If you're passionate about cybersecurity and looking for a rewarding opportunity, this role is for you.
Visual Soft, Inc is seeking qualified candidates to work on our efforts with a Prime for their end customer, a federal agency.
Position: Senior SOC - Security Analyst - (US Citizenship is a MUST) - (4 days ONSITE and 1 day REMOTE at Present, however, it may go 100% ONSITE in the near future)
Location: Washington, DC, next to Union Station metro
Compensation: Based on certifications, education, and experience, very competitive
Various Shifts available. SHIFT TIMINGS:
JOB DESCRIPTION:
The Senior SOC Analyst is primarily responsible for monitoring and responding to alerts triggered in the SIEM tool or customer requests. The analyst will investigate incidents using various tools, take immediate action or recommend measures to safeguard the U.S. Courts systems. They work as Tier 2/3 support, reviewing requests from junior analysts and escalating complex events exceeding 15 minutes of analysis to senior staff.
General Experience:
****PRIOR or ONGOING experience (4 yrs) in a SOC environment is a MUST.****
Please do not apply if you lack this professional experience.
Minimum four (4)+ years of network intrusion detection experience. Skills include investigating and evaluating network traffic, reading and interpreting logs and sniffer packets (Wireshark), analyzing data from multiple sources, and communicating findings clearly both orally and in writing.
Specialized Experience:
Candidate should have at least six (6) years of experience in intrusion detection analytics, including examining logs and console events in areas such as Splunk, Snort IDS events, PCAP, web server logs, and working within a SIEM environment.
Years of Experience: 5+ years
Education Requirement: High School diploma preferred; industry certifications like CEH or CISSP are desirable.
Clearance requirement: U.S. Citizenship is required.
Standard Benefits:
Includes 3 weeks of PTO (including sick leave), with unused PTO paid out at anniversary. Also includes 2 floating holidays and 8 public holidays, which expire annually. The company covers 50% of health and dental insurance for full-time employees; dependents can be added at an extra cost. Coverage begins after 30 days or the first of the month following 30 days of employment. Dependents' coverage is available as an out-of-pocket expense. Employees must complete paperwork within 30 days. The company provides STD, LTD, and a one-time salary equivalent life insurance at no cost. Full-time or W-2 employees are eligible for a 401(k) plan after 90 days with a 4% company match and immediate vesting, as well as profit sharing without employee contributions.