Enable job alerts via email!

SOC Analyst

Lensa

Vienna (VA)

On-site

USD 90,000 - 130,000

Full time

7 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading company in Information Technology is seeking an SOC Analyst to protect sensitive information and respond to cybersecurity incidents. This full-time role requires a strong background in IT security, relevant certifications, and the ability to work onsite with flexible hours. Excellent benefits are provided, including health insurance and 401k.

Benefits

Fortune 500-level health/dental/vision
PTO
401k
Life Insurance

Qualifications

  • Must be a U.S. citizen with an active Secret or Top Secret clearance.
  • 10+ years in Information Security or 14+ years with a Masters degree.
  • Certifications like MCSE or CCNA can substitute for experience.

Responsibilities

  • Perform network security monitoring and incident response.
  • Coordinate with government agencies for incident recording.
  • Analyze collected information to identify vulnerabilities.

Skills

Incident Response
Cybersecurity Analysis
Vulnerability Assessment
Cyber Threat Hunting
SIEM Monitoring

Education

Bachelors degree in Information Security
Masters degree in Information Security

Job description

Join to apply for the SOC Analyst role at Lensa

2 days ago Be among the first 25 applicants

Join to apply for the SOC Analyst role at Lensa

Get AI-powered advice on this job and more exclusive features.

Lensa is the leading career site for job seekers at every stage of their career. Our client, Keen Logic, is seeking professionals in Vienna, VA. Apply via Lensa today!

KeenLogic is seeking to hire an Information Security Operation Analyst (SOC Analyst) to join our team at the Drug Enforcement Administration. The Information Security Analyst is responsible for designing and implementing solutions for protecting the confidentiality, integrity, and availability of sensitive information.

This is a full-time position offering Fortune 500-level health/dental/vision, PTO, 401k, and Life Insurance. This is an onsite role with a daily schedule Core Hours: 10 AM to 2 PM, flexible start time based in Merrifield, VA.

About The Role

This is a Security Operation Center position. This position primarily focuses on cybersecurity incident detection and response. Other primary areas of focus would be: zero-day events, utilizing cybersecurity tools to conduct investigations and analysis of events, Utilizing the seven steps of the Incident Response process.

All the duties listed support one or more of the following cybersecurity related functions; information security, SA&A, incident response, cyber security, insider threat, computer forensics, vulnerability assessment and management, network data capture, intrusion detection, log management, auditing, security incident and event management (SIEM), and penetration testing.

Personnel assigned to this role will serve primarily on the Operations & Response (O&R) Team; this role may also support the Vulnerability Assessment and Penetration Test (VAPT) and Engineering teams. This position is also responsible for coordinating with both the Cybersecurity Services Section and other sections or divisions within the client’s organization. These may include, but are not limited to, IT Operations, Engineering & Integration, Software Operations, and the Office of Investigative Technology.

Required Qualifications:

MUST BE A U.S CITIZEN WITH AN ACTIVE SECRET CLEARANCE OR TOP SECRET CLEARANCE

  • Must be eligible for a Top-Secret clearance, if requested
  • Bachelors degree and 10+ years in Information Security
  • Masters degree and 14+ years in Information Security
  • Any combination of certificates such as Microsoft’s MCSE, or Cisco’s, CCNA, CCDA, or CCNP, may be considered equivalent to two (2) year of general experience/information technology experience. Certificates under the DoD IAM, IAT, IASAE, or CSSP Levels I, II or III may be considered equivalent to two (2) years of information security experience.

Preferred Qualifications:

  • CompTIA CySA+ cybersecurity analyst certification
  • Cybersecurity Incident response and Detection experience.
  • Experience in cybersecurity event triaging. Utilizing the seven steps of the Incident Response Process – (IRP)
  • Security Operation Center Experience – (SOC)
  • Conducting cyber event investigations to determine root cause of the event. Determining if the event is a True/False Positive.
  • Creating rules, thresholds, and policies associated with cybersecurity tool platforms designed to prevent Indicators of Compromise/Attack from occurring. IOC’s/IOA’s
  • Verification & Validation of information, containment, eradication, and recovery from incidents.
  • Experience in validating Hash’s Malicious IP’s, URL’s
  • Experience in investigating malicious emails and payloads.
  • Requirements analysis, program development activities, architecture, engineering, integrating, developing and/or deploying information technology products (hardware and software) in an enterprise environment.
  • Ability to create and monitor multiple cybersecurity tools dashboards.
  • Experience in Open-Source Intelligence gathering.
  • Experience with Threat hunting and vulnerability assessment.
  • Knowledge of SIEM tools and query generation

Duties

  • Performs network security monitoring and incident response for a large organization.
  • Coordinates with other government agencies to record and report incidents.
  • Maintains records of security monitoring and incident response activities, utilizing case management and ticketing technologies.
  • Monitors Security Information and Event Management (SIEM) to identify security issues for remediation.
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications, and operating systems.
  • Assists with implementation of countermeasures or mitigating controls.
  • Supports efforts to consolidate and conduct comprehensive analysis of threat data obtained from classified, proprietary, and open-source resources to provide indication and warnings of impending attacks against unclassified and classified networks.
  • Supports Team Lead on developing recommendations for changes to Standard Operating Procedures and other similar documentation.
  • Monitors and reviews logs from existing security tools and creates new security tool signatures to ensure maximum performance and availability.
  • Performs all aspects of intrusion detection, log and audit management, network and database vulnerability assessment and compliance management, and security configuration.
  • Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability. Also manages accounts, security devices, and patches; responsible for access control/passwords/account creation and administration.
  • Analyze collected information to identify vulnerabilities and potential for exploitation.
  • Provides support in the identification, documentation, and development of computer and network security countermeasures.
  • Identifies network and operating systems vulnerabilities and recommends countermeasures.
  • Supports the deployment and integration of security tools as needed.
  • Prepares written reports and provides verbal information security briefings.
  • Investigates, monitors, analyzes, and reports on information security incidents.
  • Responds to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats.
  • Use mitigation, preparedness, and response and recovery approaches, as needed to maximize information security.
  • Provides incident handling support for incident detection, analysis, coordination, and response.
  • Monitors network to actively remediate unauthorized activities.
  • Monitors intrusion detection sensors and log collection hardware and software to ensure systems are collecting relevant data.
  • Monitors all security systems to ensure maximum performance and availability.
  • Analyze computer security threat information from multiple sources, disciplines, and agencies across.

Powered by JazzHR

Seniority level
  • Seniority level
    Mid-Senior level
Employment type
  • Employment type
    Full-time
Job function
  • Job function
    Information Technology
  • Industries
    IT Services and IT Consulting

Referrals increase your chances of interviewing at Lensa by 2x

Get notified about new Security Operations Center Analyst jobs in Vienna, VA.

Security Operations With Incident Response (IR) - (Hybrid)

Washington, DC $15,000.00-$50,000.00 4 days ago

Information Security Analyst (SOC 2 Compliance)

Fairfax, VA $92,400.00-$115,000.00 1 month ago

FBI Special Agent: Cybersecurity/IT Expertise

Arlington, VA $99,461.00-$128,329.00 2 days ago

Information Security Analyst – Strategic Services

Fairfax, VA $105,000.00-$115,000.00 1 month ago

Security Analyst – Global Security Operations Center (SOC)
Operations Center Analyst, Safety & Security (Maternity Leave Coverage)

Washington, DC $75,000.00-$85,000.00 1 day ago

Security Specialist (SS-L3) NGA - Washington
Insider Threat Program RISK ADMINISTRATOR II – Mid
Information Systems Security Engineer (ISSE) - (Sterling, VA)

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

SOC Analyst

SS&C Technologies

New Jersey

Remote

USD 90,000 - 130,000

6 days ago
Be an early applicant

SOC Analyst - Remote

Lensa

Remote

USD 72,000 - 115,000

6 days ago
Be an early applicant

SOC Analyst

SonicWall

Remote

USD 70,000 - 100,000

6 days ago
Be an early applicant

SOC Analyst - Remote

Lensa

Remote

USD 72,000 - 115,000

14 days ago

SOC Analyst

Arena Technical Resources, LLC (ATR)

Washington

Remote

USD 70,000 - 110,000

30+ days ago

SOC Analyst

Lensa

McLean

On-site

USD 90,000 - 120,000

4 days ago
Be an early applicant

SOC Analyst

Tactibit Technologies

Suitland

On-site

USD 80,000 - 110,000

6 days ago
Be an early applicant

SOC Analyst

GameStop

McLean

On-site

USD 80,000 - 120,000

4 days ago
Be an early applicant

SOC Analyst

Steampunk

McLean

On-site

USD 90,000 - 120,000

7 days ago
Be an early applicant