Enable job alerts via email!
Boost your interview chances
Create a job specific, tailored resume for higher success rate.
An established industry player is seeking a dedicated SOC Analyst to join their team in Arlington. This role involves monitoring security alerts, leading incident response efforts, and mentoring junior analysts in a collaborative environment. Candidates should possess an active Top Secret clearance and a DoD 8140 Certification, with a strong understanding of incident response and the MITRE ATT&CK framework. The ideal candidate will thrive in a fast-paced setting, ensuring the security of multiple networks while effectively communicating with senior staff and government representatives. If you are passionate about cybersecurity and want to make a significant impact, this opportunity is for you.
Role: SOC Analyst
Location: Arlington, VA (5 days onsite and 2nd shift 2 pm – 10 pm)
Duration: Contract to Hire
Citizenship: US Citizen with active Top Secret clearance
Top skills: Candidates need an Active TS and must be willing/eligible to upgrade to a TS/SCI. Fully onsite in Arlington (675 N Randolph Street Arlington VA 22203). Must have a DoD 8140 Certification (A+, Network+, Security+, CEH, CISSP, etc.) or higher. Looking for 2–3 years of Tier 2 support and 3–5+ years of overall experience. Ideally, candidates will have a Bachelor's degree but flexibility is considered with more experience. Essential skills include understanding Incident Response, the MITRE ATT&CK frameworks, Splunk, PCAP, log review, and alert response.
Overview: To succeed, you need to be collaborative, able to lead your shift's technical mission, and a self-starter. You will interface with the Government and senior staff, so articulate communication in both verbal and written form is essential.
Summary: The role involves monitoring security alerts across 14 networks in a Network Operations and Security Center (NOSC). You will lead the security mission, train junior analysts, review reports, tune detection tools, and prepare documentation and reports for leadership.
Work Schedule: 8-hour shifts on business days, with occasional on-call support for weekends (details to be discussed). Responsibilities include analyzing escalated alerts, performing log and PCAP analysis, leading incident response, and mentoring junior analysts.
Qualifications: At least 2 years of mentoring or incident response leadership, a Bachelor's degree or equivalent, 3–6 years in a SOC or cybersecurity role, proficiency with SIEM (e.g., Splunk), endpoint detection tools, understanding of network protocols, and familiarity with threat frameworks like MITRE ATT&CK. Basic scripting skills are a plus. Must have DoD 8140 Cyber Incident Responder Certification (Security+, CySA+, or equivalent).