KeenLogic
SOC Analyst
KeenLogicUnited States7 hours ago
Full-timeInformation Technology
SOC Analyst – Drug Enforcement Administration (DEA)

KeenLogic is seeking to hire an Information Security Operation Analyst (SOC Analyst) to join our team at the Drug Enforcement Administration. The Information Security Analyst is responsible for designing and implementing solutions for protecting the confidentiality, integrity, and availability of sensitive information.

This is a full-time position offering Fortune 500–level health, dental, and vision benefits, PTO, 401(k), and life insurance. This is an onsite role with a daily schedule from 10:00 AM to 6:00 PM, based in Merrifield, VA.

About The Role

This is a Security Operations Center (SOC) position focused primarily on cybersecurity incident detection and response. Other primary areas of focus include:

  • Zero-day events
  • Utilizing cybersecurity tools to conduct investigations and analysis of events
  • Utilizing the seven steps of the Incident Response process

All duties support one or more of the following cybersecurity-related functions: information security, SA&A, incident response, cybersecurity, insider threat, computer forensics, vulnerability assessment and management, network data capture, intrusion detection, log management, auditing, security incident and event management (SIEM), and penetration testing.

Personnel assigned to this role will primarily serve on the Operations & Response (O&R) Team and may also support the Vulnerability Assessment and Penetration Test (VAPT) and Engineering teams.

This position also coordinates with the Cybersecurity Services Section and other client divisions, including:

  • IT Operations
  • Engineering & Integration
  • Software Operations
  • Office of Investigative Technology

Required Qualifications

  • Must be a U.S. citizen with an active Secret or Top Secret clearance
    • Must be eligible for a Top Secret clearance if requested
  • Bachelor’s degree from an accredited college or university in one or more of the following disciplines (or equivalent documented formal training):
    • Computer Science
    • Information Systems
    • Engineering
    • Business
    • Physical Science
    • Other technology-related disciplines
  • Education Substitution:
    • Any combination of certificates such as Microsoft MCSE or Cisco CCNA, CCDA, or CCNP may be considered equivalent to two (2) years of general IT experience
    • Certificates under DoD IAM, IAT, IASAE, or CSSP Levels I, II, or III may be considered equivalent to two (2) years of information security experience
  • 3+ years of documented work experience performing any combination of:
    • Information System Security
    • Security Assessment & Authorization
    • Cybersecurity
    • Computer Forensics
    • Insider Threat
Preferred Qualifications

  • CompTIA CySA+ cybersecurity analyst certification
  • Cybersecurity incident response and detection experience
  • Experience in cybersecurity event triaging using the seven steps of the Incident Response Process (IRP)
  • Security Operations Center (SOC) experience
  • Conducting cyber event investigations to determine root cause and identify true/false positives
  • Creating rules, thresholds, and policies for cybersecurity tools (IOCs/IOAs)
  • Verification and validation, containment, eradication, and recovery from incidents
  • Experience validating hashes, malicious IPs, and URLs
  • Experience investigating malicious emails and payloads
  • Requirements analysis, program development, architecture, engineering, integration, and deployment of IT products in an enterprise environment
  • Ability to create and monitor multiple cybersecurity tool dashboards
  • Open-source intelligence gathering experience
  • Threat hunting and vulnerability assessment experience
  • Knowledge of SIEM tools and query generation

Duties

  • Perform network security monitoring and incident response for a large organization
  • Coordinate with other government agencies to record and report incidents
  • Maintain records of security monitoring and incident response activities using case management and ticketing technologies
  • Monitor SIEM tools to identify security issues for remediation
  • Recognize intrusion attempts and compromises through detailed analysis of event data
  • Communicate alerts regarding intrusions and compromises to networks, applications, and operating systems
  • Assist with implementation of countermeasures or mitigating controls
  • Support threat data analysis from classified, proprietary, and open-source resources
  • Support Team Lead in developing recommendations for changes to Standard Operating Procedures
  • Monitor and review logs and create new security tool signatures
  • Perform intrusion detection, log and audit management, vulnerability assessment, compliance management, and security configuration
  • Install, configure, troubleshoot, and maintain server configurations (hardware and software)
  • Manage accounts, security devices, patches, access control, and passwords
  • Analyze collected data to identify vulnerabilities and exploitation potential
  • Support development of security countermeasures
  • Identify network and OS vulnerabilities and recommend countermeasures
  • Support deployment and integration of security tools
  • Prepare written reports and provide verbal information security briefings
  • Investigate, monitor, analyze, and report on security incidents
  • Respond to crisis or urgent situations to mitigate threats
  • Apply mitigation, preparedness, response, and recovery approaches
  • Provide incident handling support for detection, analysis, coordination, and response
  • Actively monitor and remediate unauthorized activities
  • Monitor intrusion detection sensors and log collection systems
  • Ensure security systems are operating at maximum performance and availability
  • Analyze computer security threat information from multiple sources and agencies

Powered by JazzHR

rqTaeGTcBZ

Key Skills

Ranked by relevance