SOC Analyst

Job Locations US-IN-Indianapolis
ID
2024-21575
# of Openings
1
Category
Information Technology
Type
CTH

Overview

  • Tier One Technologies is seeking a SOC Analyst to work on a Contract-to-Hire position with our direct US Government client.
  • This on-site position will be located Indianapolis, IN.
  • SELECTED CANDIDATES WITHOUT REQUIRED CLEARANCE WILL BE SUBJECT TO A FEDERAL GOVERNMENT BACKGROUND INVESTIGATION TO RECEIVE IT.
  • Must be a US citizen.
  • Must hold active Secret clearance.

Responsibilities

  • Serve as a Cybersecurity service provider analyst at the client’s site.
  • Assist with monitoring, analyzing, detecting, and responding to Cyber events and incidents under supervision.
  • Assist with supporting dynamic Cyber defense and delivering operational effects, including intrusion detection and prevention and situational awareness.
  • Create, tune, and compile metrics of all security devices and documentation of processes and procedures. Identify security issues and risks and then develop mitigation plans.
  • Work in a 24/7 security operations center (SOC) environment at an Indianapolis client facility, including maintaining direct contact with client management to provide analysis and trending of security log data from various security devices.
  • Ability to work a 12AM -12PM or 12PM – 12AM shift, including some weekends.

Qualifications

  • 3+ years of experience with incident handling, forensics, sensor alert tracking, or Cybersecurity case management.
  • 1+ years of experience in a SOC.
  • CERTIFICATIONS: DoD 8570 Baseline Certification CSSP Analyst (One or more required):
    • CEH, CFR, CCNA, CySA+, GCIA, GCIH, GICSP, SCYBER, Cloud+, PenTest+
  • Must be a US Citizen and have active Secret clearance.
  • Experience with Cybersecurity tools, including ArcSight, ACAS, or equivalent SIEM tools.
  • Experience with Cybersecurity forensics tools and methodologies.
  • Experience with network ports, protocols, log review and analysis.
  • Ability to apply NIST, federal, and DoD guidelines, policies, directives, and memos as they relate to Cybersecurity.
  • Ability to provide monitoring and risk analysis of zero-day and other vulnerabilities.
  • Knowledge of industry, government and DoD best practices, including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors.
  • Knowledge of DoD system solutions to mitigate risk in any activity that potentially impacts the security of existing IT and information management.
  • Must not have traveled outside the US for a combined total of 6 months or more in the last 5 years.
  • Must have resided in the US for the last 5 years.

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed