Booz Allen Hamilton-posted 1 day ago
$99,000 - $225,000/Yr
Full-time • Mid Level
San Antonio, TX
1-10 employees

Cybersecurity Incident Handler, Senior The Opportunity: As a security operations center ( SOC ) analyst, you’re in the middle of the action, resp ond ing to and mitigating threats in real time. You’re the first line of cyber defense for your organization, and they look to you for guidance on best practices and security measures. We need a Tier 2 SOC analyst like you to help us secure critical infrastructure from the constant onslaught of cyber-attacks for the mission partner. As a SOC analyst on our team, you’ll improve monitoring strategies and analyze threats. You’ll work with the team to understand, mitigate, and resp ond to threats quickly, restoring operations and limiting the impact. You’ll guide efforts to figure out just how many systems are affected and assist recovery efforts. You’ll combine threat intelligence, event data, and assessments from recent events, and identify patterns to understand attackers’ goals to stop them from succeeding. This is a great opportunity to hone your cybersecurity skills with hands-on experience in threat assessment and incident response. Work with us as we secure Air Force networks from malicious actors. Join us. The world can’t wait.

  • Improve monitoring strategies and analyze threats
  • Work with the team to understand, mitigate, and resp ond to threats quickly, restoring operations and limiting the impact
  • Guide efforts to figure out just how many systems are affected and assist recovery efforts
  • Combine threat intelligence, event data, and assessments from recent events, and identify patterns to understand attackers’ goals to stop them from succeeding
  • Experience in a SOC, incident response, or cyber threat analysis role
  • Experience in analyzing logs, network traffic, digital forensics, malware analysis, threat intelligence, and cybersecurity
  • Experience with incident response frameworks, such as NIST or MITRE ATT&CK
  • Knowledge of SIEM, such as Splunk, Elastic, QRadar, or Sentinel, and EDR, such as CrowdStrike or Microsoft Defender, IDS, and IPS
  • Knowledge of operating system-specific exploitation vectors
  • TS/SCI clearance
  • HS diploma or GED
  • DoD 8140 Level II Certification, such as Security+, CySA+, or CISSP Certification
  • Experience using Micro sof t Office products
  • Experience with cyber technologies and capabilities, including continuous monitoring, incident response, advanced threat hunt, ongoing assessments, and secure Cloud and mobile capabilities
  • Experience with Cloud and DevSecOps
  • Experience with cybersecurity tools and solutions such as Micro sof t Defender for Endpoint, Corelight, Suricata or Snort, Palo Alto and Cisco firewalls, Archer Case Management, ServiceNow, Threat Connect, Splunk Enterprise Security, Splunk SOAR, Cofense, IronPort Mail Gateways, or Micro sof t G5 Defender suite
  • Possession of excellent verbal and written communication skills
  • Possession of excellent time management and analytical skills
  • health
  • life
  • disability
  • financial
  • retirement benefits
  • paid leave
  • professional development
  • tuition assistance
  • work-life programs
  • dependent care
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service