Negotiable
Undetermined
Hybrid
Remote or Hybrid in Washington, District of Columbia
Summary: The Senior SOC Analyst role involves overseeing incident response, insider threat investigations, and cyber threat analysis within a Security Operations Center (SOC). The position requires extensive experience in security monitoring and analysis, as well as proficiency in various security tools and technologies. Candidates should possess relevant certifications and demonstrate strong communication and documentation skills. The role is remote or hybrid based in Washington, DC, and is a contract-to-hire opportunity.
Key Responsibilities:
- Conduct incident response and insider threat investigations.
- Monitor security events and analyze anomalous activities using host-based and network-based tools.
- Create custom content for detection efforts and manage security incidents.
- Provide training and mentorship to junior and mid-level cyber workforce members.
- Utilize packet capture applications for data analysis and malware reverse engineering.
- Document findings and communicate technical reports effectively.
Key Skills:
- 7+ years of experience in incident response and information security.
- 5+ years of hands-on experience in security monitoring and analysis.
- Certifications such as GCIA, GCIH, GCFA, GCED, or IAT Level III.
- Proficiency in SIEM platforms, particularly Splunk.
- Strong knowledge of scripting languages (BASH, PowerShell, Python).
- Experience with malware analysis and reverse engineering.
Salary (Rate): £60,000 yearly
City: Washington
Country: United States
Working Arrangements: hybrid
IR35 Status: undetermined
Seniority Level: Senior
Industry: IT
Job Title: Senior SOC Analyst
Location: Washington, DC (Remote )
Duration: 6 + Months Contract to hire role
Pref s with Active public Trust clearance
REQUIRED Qualifications:
A minimum of seven (7) years of professional experience with a solid understanding of incident response, insider threat investigations, forensics, cyber threats and information security.
A minimum of five (5) years of hands-on experience with experience in the last two (2) years that includes host-based and network-based security monitoring, identifying and analyzing anomalous activities with familiarity in host-based tools, intrusion detection systems, intrusion analysis functions, security information event management (SIEM) platforms, endpoint threat detection tools, and ticket management in a SOC Operations environment.
One or more of the following certifications: GCIA, GCIH, GCFA, GCED, or other Information Assurance Technician (IAT) Level III certification (CASP+ CE, CCNP Security, CISA, CCSP), as well as an active CISSP, or the ability to obtain one within six (6 months) of hire.
Demonstrated understanding of incident response, insider threats, forensics, cyber threats and information security.
Prior experience with a Splunk as Security Information and Event monitoring (SIEM) platform and log management system.
Experience creating custom content such as rules, filters, signatures, countermeasures and operationally relevant scripts to support analysis and detection efforts. Strong SPL knowledge is preferred.
Experience collecting data and reporting results; handling and escalating security issues or emergency situations appropriately; providing incident response capabilities to contain and mitigate threats to maintain the confidentiality, integrity, and availability of protected data.
Ability and experience extracting and managing complex large data sets.
Strong documentation and written communication skills with technical report writing experience.
Experience with ad-hoc training to junior, mid, or senior members of a cyber work force.
Existing Subject Matter Expertise (SME) of Advanced Persistent Threat (APT) or emerging threats.
Proficiency in utilizing various packet capture (PCAP) applications/engines and in analysis of PCAP and NetFlow data.
Experience with static and dynamic malware analysis, including reverse engineering of binaries.
Familiarity with coding, scripting languages (BASH, PowerShell, Python, etc.), or with software development frameworks such as .NET. Desired Qualifications:
Experience mentoring and/or leading a technical team.
Experience in Cyber Hunt activities.
Advanced troubleshooting skills.
Metadata extraction and analysis.
Malware Reverse Engineering (MA/RE).
Education:
BS or MS degree preferred