SIRC is looking to fill an opening for a Cybersecurity SOC Analyst position for a project in Washington, DC. This is our DIRECT CLIENT. If you are interested, please send me your resume along with your expected salary or hourly rate.
The SOC Analyst is a tier 2 tech resource responsible for monitoring, detecting, analyzing, remediating, and reporting on cyber events and incidents impacting the tech infrastructure of the District of Columbia. Serves as advanced escalation point.
- Provide in-depth cybersecurity analysis, and trending of log, event data, and alerts from diverse network devices and applications within the enterprise to identify and troubleshoot specific cybersecurity incidents and make sound recommendations that enable expeditious remediation.
- Conduct security tool/application (for example, MacAfee siem) tuning engagements with analysts and engineers to develop/adjust rules and analyst response procedures and reduce false-positives from alerting.
- Utilize advanced background and experience in information technology and incident response handling to scrutinize escalated cybersecurity events from tier 1 analysts—distinguishing these events from benign activities, and escalating confirmed incidents to the incident response lead.
- Recognize, create and ingest indicators of compromise (ioc’s) for attacker tools, tactics, and procedures into network security tools/applications (for example, McAfee siem, palo alto content filter, anomali threatstream) to protect the government of the District of Columbia network.
- Provide technical analytical guidance to, and quality-proofing of tier 1 analysts analytical advisories and assessments prior to release from soc.
- Coordinate with and provide expert technical support to enterprise-wide technicians and staff to resolve confirmed incidents.
- Report common and repeat problems (trend analysis) to soc management and propose process and technical improvements to improve the effectiveness and efficiency of the incident handling process.
- Respond to inbound requests via phone and other electronic means for technical assistance, and resolve problems independently. Coordinate escalations and collaborate with internal technology teams to ensure timely resolution of issues.