Are you ready to take an active role in cyber defense for a DoD client? Are you looking for an opportunity to protect critical infrastructure from the constant onslaught of cyber attacks? If you want to sharpen your skills by analyzing threats real-time, you want to be a Tier 2 SOC analyst.
As an analyst on our SOC team, youll monitor and analyze threats, using state-of-the-art tools. Youll use your cybersecurity skills to support dynamic Cyber defense and deliver operational effects, including intrusion detection and prevention and situational awareness. Create, tune, and compile metrics of all security devices and documentation of processes and procedures. Identify security issues and risks and then develop mitigation plans. Work in a 24/7 network operations center (NOC) or security operations center (SOC) environment, including maintaining direct contact with client management to provide analysis and trending of security log data from various security devices.
Youll work with the team to understand, mitigate, and respond to threats quickly, restoring operations and limiting the impact. Youll analyze incidents to figure out just how many systems are affected and assist recovery efforts. Youll combine threat intelligence, event data, and assessments from recent events, and identify patterns to understand attackers goals to stop them from succeeding. This is a great opportunity to build your cybersecurity skills with hands on experience in threat assessment and incident response. Join us as we protect the DoD from malicious actors.
Empower change with us.
-3+ years of experience with incident handling, forensics, sensor alert tracking, or Cybersecurity case management
-1+ years of experience in a NOC or SOC
-Experience with Cybersecurity forensics tools and methodologies
-Experience with network ports and protocols
-Experience with log review and analysis
-Top Secret clearance
-BA or BS degree
-DoD 8570 IAT Level II Certification, including Security+ CE
Nice If You Have:
-Experience with Cybersecurity tools, including ArcSight, Splunk ACAS, or equivalent SIEM tools
-Knowledge of industry, government, and DoD best practices, including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors
-Knowledge of DoD system solutions to mitigate risk in any activity that potentially impacts the security of existing IT and information management
-Ability to work shifts in a 24x7x365 environment
-Ability to triage SIEM events and determine escalation of indicators
-Ability to apply NIST, federal, and DoD guidelines, policies, directives, and memos as they relate to Cybersecurity
-Possession of excellent analytical, collaboration, and detail skills
meet eligibility requirements for access to classified information; Top Secret
clearance is required.
Data Privacy For more information on how Booz Allen uses your information, please see our .