Overview
- Tier One Technologies is seeking a SOC Analyst to work on a Contract-to-Hire position with our direct US Government client.
- This on-site position will be located Indianapolis, IN.
- SELECTED CANDIDATES WITHOUT REQUIRED CLEARANCE WILL BE SUBJECT TO A FEDERAL GOVERNMENT BACKGROUND INVESTIGATION TO RECEIVE IT.
- Must be a US citizen.
- Must hold active Secret clearance.
Responsibilities
- Serve as a Cybersecurity service provider analyst at the client’s site.
- Assist with monitoring, analyzing, detecting, and responding to Cyber events and incidents under supervision.
- Assist with supporting dynamic Cyber defense and delivering operational effects, including intrusion detection and prevention and situational awareness.
- Create, tune, and compile metrics of all security devices and documentation of processes and procedures. Identify security issues and risks and then develop mitigation plans.
- Work in a 24/7 security operations center (SOC) environment at an Indianapolis client facility, including maintaining direct contact with client management to provide analysis and trending of security log data from various security devices.
- Ability to work a 12AM -12PM or 12PM – 12AM shift, including some weekends.
Qualifications
- 3+ years of experience with incident handling, forensics, sensor alert tracking, or Cybersecurity case management.
- 1+ years of experience in a SOC.
- CERTIFICATIONS: DoD 8570 Baseline Certification CSSP Analyst (One or more required):
- CEH, CFR, CCNA, CySA+, GCIA, GCIH, GICSP, SCYBER, Cloud+, PenTest+
- Must be a US Citizen and have active Secret clearance.
- Experience with Cybersecurity tools, including ArcSight, ACAS, or equivalent SIEM tools.
- Experience with Cybersecurity forensics tools and methodologies.
- Experience with network ports, protocols, log review and analysis.
- Ability to apply NIST, federal, and DoD guidelines, policies, directives, and memos as they relate to Cybersecurity.
- Ability to provide monitoring and risk analysis of zero-day and other vulnerabilities.
- Knowledge of industry, government and DoD best practices, including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors.
- Knowledge of DoD system solutions to mitigate risk in any activity that potentially impacts the security of existing IT and information management.
- Must not have traveled outside the US for a combined total of 6 months or more in the last 5 years.
- Must have resided in the US for the last 5 years.
Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed