Enable job alerts via email!

Tier 2 SOC Analyst with Security Clearance

Anonymous Employer

Arlington (VA)

On-site

USD 80,000 - 110,000

Full time

10 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking a Tier 2 SOC Analyst to enhance their Network Operations and Security Center. In this pivotal role, you will monitor security alerts across multiple networks, lead incident response efforts, and provide mentorship to junior analysts. Your expertise in SIEM platforms and endpoint detection tools will be crucial as you analyze threats and develop mitigation strategies. This position offers a unique opportunity to influence security protocols and ensure the safety of critical systems. Join a dynamic team dedicated to maintaining the highest security standards and making a significant impact in the cybersecurity landscape.

Qualifications

  • 3+ years of experience with SIEM and endpoint detection tools.
  • Strong understanding of network protocols and packet analysis.
  • Ability to analyze logs and detect adversary TTPs.

Responsibilities

  • Analyze escalated alerts and perform advanced log analysis.
  • Lead incident response activities and prepare detailed reports.
  • Mentor Tier 1 analysts and assist in tuning detection tools.

Skills

SIEM platforms (e.g., Splunk)
Endpoint detection tools (e.g., CrowdStrike)
Network protocols
Packet analysis
Basic scripting (e.g., Python)

Education

DoD 8140 Cyber Incident Responder Certification
Security+, CySA+, or equivalent
GCIH, GCFA, Cloud+, GCSA (preferred)

Tools

Wireshark
Snort
Suricata
Microsoft Defender

Job description

You will need to login before you can apply for a job.

Tier 2 SOC Analyst with Security Clearance

They are hiring 2 people for shift work, one per shift, M–F, 1 person, and 1 person.

The position entails working in a Network Operations and Security Center (NOSC), where the team is responsible for monitoring security and health alerts for systems on 14 different networks. The ideal candidate will lead the security mission in the NOSC by providing training to junior analysts, reviewing reports written by them, tuning tools for anomalous detection, and preparing reports, presentations, and executive summaries.

Key Responsibilities
  1. Analyze and investigate escalated alerts from Tier 1 analysts using tools such as SIEM, EDR, IDS/IPS, and network monitoring solutions.
  2. Perform advanced log analysis, PCAP review, and endpoint investigations to determine threats' nature and scope.
  3. Lead incident response activities for escalated events, collaborating with Tier 3 analysts for complex or high-severity incidents.
  4. Prepare detailed incident reports and deliver briefings to internal stakeholders, including senior leadership.
  5. Collaborate with Tier 3 analysts, system administrators, and other IT teams to implement mitigation strategies.
  6. Mentor and provide technical guidance to Tier 1 NSOC analysts, including training on incident handling and response procedures.
  7. Assist in tuning detection tools and developing use cases for anomalous activity detection.
  8. Develop, update, and maintain comprehensive documentation ensuring accuracy and alignment with current protocols and best practices.
Required Qualifications
  • Experience as a Task Lead, Team Lead, or Shift Lead is preferred.
  • DoD Top Secret Clearance with SCI/SAP eligibility is required.
  • Proficiency with SIEM platforms (e.g., Splunk) and endpoint detection tools (e.g., CrowdStrike, SentinelOne, Microsoft Defender) for 3+ years.
  • Certifications such as DoD 8140 Cyber Incident Responder Certification (Security+, CySA+, or equivalent) are required.
  • Preferred certifications include GCIH, GCFA, Cloud+, GCSA.
  • Strong understanding of network protocols, packet analysis, and tools like Wireshark or Zeek.
  • Experience with IDS/IPS/NDR/EDR tools (e.g., Snort, Suricata, Bricata).
  • Ability to analyze logs, correlate data, and detect adversary TTPs.
  • Familiarity with threat intelligence frameworks like MITRE ATT&CK, Cyber Kill Chain, and IOC analysis.
  • Basic scripting or automation skills (e.g., Python, PowerShell, Bash).
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Jr. System Administrator (Documentum)

Akima

Bethesda

Remote

USD 90,000 - 90,000

15 days ago

SOC Analyst - Tier 2

Chenega Corporation

Oakton

On-site

USD 70,000 - 100,000

Yesterday
Be an early applicant

SOC Analyst - Tier 2

Chenega MIOS SBU

Vienna

On-site

USD 80,000 - 100,000

Today
Be an early applicant

SOC Analyst (Tier 2/3) – Splunk / Endpoint Security

Blue Cyber

Washington

Hybrid

USD 90,000 - 90,000

3 days ago
Be an early applicant

SOC Analyst with Security Clearance

NasTech Global, Inc.

Arlington

On-site

USD 70,000 - 100,000

8 days ago

SOC Analyst - Tier 2

Chenega Corporation

Virginia

On-site

USD 60,000 - 100,000

Yesterday
Be an early applicant

Top Secret Cleared Tier 2 SOC Analyst

TEKsystems

Arlington

On-site

USD 80,000 - 100,000

7 days ago
Be an early applicant

Tier 2 Incident Response Analyst

Via Logic LLC

Richmond

Remote

USD 85,000 - 154,000

5 days ago
Be an early applicant

Business Analyst

Tech Soft Inc

Great Falls Crossing

Remote

USD 60,000 - 100,000

15 days ago