SOC Analyst - Tier 2

Iron Vine Security, LLC Career Center
Suitland, MD Full Time
POSTED ON 9/19/2022 CLOSED ON 12/12/2022

What are the responsibilities and job description for the SOC Analyst - Tier 2 position at Iron Vine Security, LLC Career Center?

Position Title: Mid Level Security Operations Center Analyst

Location: Suitland, MD

 

Position Summary:

Iron Vine Security is a rapidly growing information security and information technology company in Washington, DC. We are looking to hire a Mid Level Cyber Defense Incident Responder to support a full range of cyber security services on a long-term contract in Washington DC. The position is full time/permanent and will support a US Government civilian agency. The position is available immediately upon finding a qualified candidate with the appropriate background clearance.

 

Job Requirements:

· Strong written and verbal communication skills.

· Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).

· Knowledge of system administration, network, and operating system hardening techniques.

· Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).

· Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.

· Demonstrated ability to interact effectively with senior management and leadership.

· Ability to design incident response for cloud service models.

· Knowledge of incident categories, incident responses, and timelines for responses.

· Knowledge of incident response and handling methodologies.

· Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.

· Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list)

 

Certifications/Licenses:

· Bachelor’s degree or higher

· 5 years’ experience in Malware analysis, digital forensics, data/network analysis, penetration testing, information assurance, leading incident handling

· Must have, or be able to obtain within 3 months, one of the following certifications: CERT Certified Computer Security Incident Handler (CSIH), ECC Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), GIAC Information Security Fundamentals (GISF), or ISC2 Certified Information System Security Professional (CISSP).

· Active Secret clearance or eligible to obtain a Secret clearance

 

Additional Experience Preferred:

· Experience identifying, capturing, containing, and reporting malware.

· Must have, or be able to obtain within 3 months, one of the following certifications: CERT Certified Computer Security Incident Handler (CSIH), ECC Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), GIAC Information Security Fundamentals (GISF), or ISC2 Certified Information System Security Professional (CISSP).

· Skill in preserving evidence integrity according to standard operating procedures or national standards.

· Strong securing network communications experience.

· Recognizing and categorizing types of vulnerabilities and associated attacks.

· Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters).

· Experience performing damage assessments.

· Skill in using security event correlation tools and design incident response for cloud service models.

· Desirable additional certifications are those that address incident handling (identification, overview and preparation) buffer overflow, client attacks, covering tacks (networks, systems), denial of service attaches, network attacks, password attacks, reconnaissance, scanning (discovery and mapping, techniques, and defense), session hijacking and cache poisoning, techniques for maintaining access, web applications attacks, worms, bots, and bot-nets

 

Position Responsibilities:

· Coordinate incident response functions.

· Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.

· Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.

· Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.

· Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation.

· Perform cyber defense trend analysis and reporting.

· Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.

· Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs).

· Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.

· Track and document cyber defense incidents from initial detection through final resolution.

· Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness).

· Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.

· Coordinate with intelligence analysts to correlate threat assessment data.

· Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise.

Tier III SOC Analyst (Hybrid)
Ampsight -
Sterling, VA
Remote -Senior SOC Analyst (Tier 2+)
IBSS -
Silver Spring, MD
Incident Response Analyst Tier 2 (Hybrid)
Gray Tier Technologies -
Ashburn, VA

For Employer
Looking for Real-time Job Posting Salary Data?
Keep a pulse on the job market with advanced job matching technology.
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

Sign up to receive alerts about other jobs with skills like those required for the SOC Analyst - Tier 2.

Click the checkbox next to the jobs that you are interested in.

  • Integration Management Skill

    • Income Estimation: $100,653 - $131,118
    • Income Estimation: $98,105 - $131,515
  • Mobility Management Skill

    • Income Estimation: $101,687 - $131,084
    • Income Estimation: $125,103 - $163,772
This job has expired.
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Not the job you're looking for? Here are some other SOC Analyst - Tier 2 jobs in the Suitland, MD area that may be a better fit.

SOC Analyst - Tier III

Foxhole Technology, Inc., Washington, DC

Senior SOC/Cyber Network Defense Analyst (CNDA)

Gray Tier Technologies, Arlington, VA