Enable job alerts via email!

SOC Analyst - Tier 1 (ONSITE)

Serigor Inc

Washington (District of Columbia)

On-site

USD 60,000 - 100,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player seeks motivated Tier 1 Security Analysts to join their dynamic Security Operations Center. In this role, you'll be at the forefront of cybersecurity, monitoring systems, responding to incidents, and collaborating with a team of experts to protect vital information. Your contributions will directly impact the organization's security posture as you analyze alerts, coordinate responses, and develop incident reports. If you are passionate about cybersecurity and eager to grow in a supportive environment, this opportunity is perfect for you.

Qualifications

  • 1+ years of experience in implementing IS technologies and incident response.
  • Strong scripting skills in Perl and PowerShell for automation.

Responsibilities

  • Monitor security systems and respond to alerts in real-time.
  • Analyze security data to identify incidents and threats.
  • Coordinate incident response actions with team members.

Skills

Implementing IS technologies (firewalls, IDS/IPS, SIEM)
Scripting and tool automation (Perl, PowerShell, Regex)
Information security incident response plans
Developing IT solutions & services
Excellent written and oral communication skills

Education

Bachelor's degree in Computer Science
Cyber Security Certifications (CompTIA Security+)

Tools

Security Incident and Event Management (SIEM)
SOAR platforms
Antivirus software
Network traffic analyzers

Job description

Job Title: SOC Analyst - Tier 1 (ONSITE)

Location: Washington, DC

Duration: 12 Months+


Job Description:

The Client is the central technology organization of the Client. It sets the standard for a number of information technology functions including the security policies and procedures for the District's IT footprint. The Client team is looking for 2 Tier 1 Security Analysts. Each role is responsible for monitoring The Security Operations Center by responding to alerts, notifications, communications, and providing incident response activities such as tracking the incident, communication with stakeholders, remediation and recovery actions, and reporting pertaining to security incidents. The analysts follow standard operating procedures for detecting, classifying, and reporting incidents under the supervision of Tier 2 and Tier 3 staff.


Roles and Responsibilities:

  1. Perform real-time monitoring of internal and information technology security equipment and systems to determine operational status and performance using various Security Incident and Event Management (SIEM) tools, SOAR platforms, and other related security management applications.
  2. Analyze both raw and processed security alert and event data to identify potential security incidents, threats, mitigations, and vulnerabilities.
  3. Support follow-on actions, such as coordinating with other organizational teams to facilitate remediation of the alert/event/incident, and close out the investigation.
  4. Perform initial alert/event/incident triage used for investigation.
  5. Initiate incident notification, case tracking/management, recovery actions, and report status updates.
  6. Perform incident response analysis uncovering attack vectors involving a variety of malware, data exposure, and phishing and social engineering methods.
  7. Coordinate process and procedure actions with geographically separated team members.

Detailed Tasks: Incident Response

  1. Support and develop reports during and after incidents, which include all actions taken to properly mitigate, recover, and return operations to normal.
  2. Participate in the remediation of incidents and responses that are generated from live threats against the enterprise.
  3. Coordinate and provide technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.
  4. Assist in real-time cyber defense incident handling tasks to support deployable Incident Response Teams (IRTs).

Desired Background:

  1. Bachelors’ degree in Computer Science, Engineering, Information Technology, Cyber Security, or equivalent experience in Cyber/IT roles (SOC experience preferred, but not required) and Cyber Security Certifications such as CompTIA Security+.
  2. Excellent written and oral communication skills.
  3. Self-motivated and able to work independently.

Compliance:

  1. Understand, enforce, and adhere to the company policies and procedures.
  2. Have read and understand the Information Security Policy and supporting procedures.
  3. Understand and abide by our non-disclosure and confidentiality agreements.

Minimum Education/Certification Requirements:

  1. BS Degree in IT, Cybersecurity, or Engineering, or equivalent experience.

Skills:

Skills Required / Desired Amount of Experience
Implementing, administering, and operating IS technologies such as firewalls, IDS/IPS, SIEM, Antivirus, network traffic analyzers, and malware analysis Required 1 Years
Utilizing advanced experience with scripting and tool automation such as Perl, PowerShell, Regex Required 1 Years
Developing, leading, and executing information security incident response plans Required 1 Years
Developing standard and complex IT solutions & services, driven by business requirements and industry standards Required 1 Years
BS Degree in IT, Cybersecurity, Engineering, or equivalent experience Required
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.