Sr. SOC Analyst Job

Sr. SOC Analyst (Job Number:434584) Description: SAIC is currently seeking candidates for a Sr. SOC Analyst, supporting one a federal civilian agency in Vienna, VA. This is an exciting opportunity to be part of a key team of cyber security professionals here at SAIC, supporting full life cycle cyber security operations for our customer. We are seeking an individual that can bring security analysis and incident response experience to support daily operations and help grow and mature our current SOC environment. As a Sr. SOC Analyst you will directly support the Security Operations Center by applying analytic and technical skills to investigate intrusions, identify malicious activity and potential insider threats, and perform incident response. The analyst will also work with other analyst staff for development and enhancement of existing detection and response capabilities including creation of SIEM content, IDS rules, SOP documentation, and implementation of incident response methodologies. Responsibilities: - General SIEM monitoring, analysis, content development, and maintenance - Research, analysis, and response for alerts; including log retrieval and documentation - Conduct analysis of network traffic and host activity across a wide array of technologies and platforms - Compile detailed investigation and analysis reports for internal SOC consumption and delivery to management - Capture intelligence on threat actor TTPs and develop countermeasures in response to threat actors - Analyze network traffic, IDS/IPS/DLP events, packet capture, and FW logs - Develop advanced queries and alerts to detect adversary actions - Lead investigation and response efforts into advanced/targeted attacks - Hunt for and identify threat actor groups and their techniques, tools and processes - Provide expert analytic investigative support of large scale and complex security incidents - Perform Root Cause Analysis of security incidents for further enhancement of alert catalog - Continuously improve processes for use across multiple detection sets for more efficient Security Operations - Review alerts generated by detection infrastructure for false positive alerts and modify alerts as needed - Develop dashboards and reports to identify potential threats, suspicious/anomalous activity, malware,etc. - Provide forensic analysis of network packet captures, DNS, proxy, Netflow, malware, host-based security and application logs, as well as logs from various types of security sensors Qualifications: Required Education and Experience - Bachelor-s degree or higher in a technical field such as Computer Science, Information Security, Information Technology, Computer Engineering, Information Systems, etc s and 5 years or more experience; Masters and three (3) years or more experience; PhD and 0 years related experience. - US Citizen with the ability to obtain a Public Trust. (Note: An DOD clearance cannot be utilized for this role.) - CISSP or GCIH or GCIA OR the ability to obtain after hire date. - 5+ years of relevant cyber security experience in IT Security, Incident Response or network security with strong knowledge working in a SOC - 3+ years- experience with the incident response process, including detecting advanced adversaries, log analysis using Splunk or similar tools, and malware triage - Experience with creating automated log correlations in Splunk or a similar tool to identify anomalous and potentially malicious behavior - Demonstrated knowledge of the Splunk search language, search techniques, alerts, dashboards and report building. - Strong analytical and investigation skills - Working knowledge of root causes of malware infections and proactive mitigation - Ability and hands-on experience to lead/delegate/assist incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts - Ability to examine and interpret packet capture data (Wireshark, tcpdump, etc.) - Experience and knowledge of packet flow, TCP/UDP traffic, firewall technologies, IDS technologies, proxy technologies, antivirus, spam and spyware solutions - Experience with the Windows file system and registry functions or NIX operating systems and command line tools - Knowledge of typical behaviors of both malware and threat actors and how common protocols and applications work at the network level, including DNS, HTTP, and SMB. - Experience working in fast paced environments, and ability to manage workload even during times of stress or escalated activity - Excellent oral and written communications skills SAIC Overview:SAIC is a premier technology integrator providing full life cycle services and solutions in the technical, engineering, intelligence, and enterprise information technology markets. SAIC is Redefining Ingenuity through its deep customer and domain knowledge to enable the delivery of systems engineering and integration offerings for large, complex projects. SAIC has approximately 15,000 employees are driven by integrity and mission focus to serve customers in the U.S. federal government. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $4.5 billion. For more information, visit saic.com. EOE AA M/F/Vet/Disability Job Posting: Apr 23, 2018, 12:55:07 PM Primary Location: United States-VA-VIENNA Clearance Level Must Currently Possess: None Clearance Level Must Be Able to Obtain: Public Trust Potential for Teleworking: No Travel: None Shift: Day Job Schedule: Full-time - provided by Dice
Analysis, Analyst, AntiVirus, Automated, CISSP, Development, DNS, Firewall, HTTP, Management, Protocols, Research, Security, Windows

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Sr. SOC Analyst Job
Vienna, VA SAIC
Sr Program Analyst with TS/SCI Clearance
Springfield, VA General Dynamics Information Technology
SOC Analyst (JoinOCI-Edge)
Richmond, VA Oracle
SOC Analyst (JoinOCI-Edge)
Vienna, VA Oracle
Utilities / Infrastructure Analyst Job
Chantilly, VA SAIC