Booz Allen Hamilton-posted 9 days ago
Full-time • Entry Level
San Antonio, TX

Cybersecurity Incident Handler The Opportunity: As a security operations center analyst, you’re in the middle of the action, responding to and mitigating threats in real time. You’re the first line of cyber defense for your organization, and they look to you for guidance on best practices and security measures. We need a Tier 1 SOC analyst like you to help us secure critical infrastructure from the constant onslaught of cyber-attacks for the mission partner. As an SOC analyst on our team, you’ll develop network defense skills as you learn to monitor, detect, and analyze threats by interacting directly with affected users and state-of-the-art tools. When an incident is detected, you’ll work with the team to collect data to help incident response understand and mitigate the threat. You’ll analyze alerts to figure out just how many systems are affected and initiate recovery efforts. You’ll contribute to assessments and learn how to analyze patterns to understand attackers’ goals to stop them from succeeding. This is a great opportunity to hone your cybersecurity skills and learn more about threat assessment and incident response. Work with us as we secure vital Air Force networks from malicious actors. Join us. The world can’t wait.

  • Experience with a security operations center actively engaged with incident response activities, including analysis of artifacts, writing incident reports, and triaging of security incidents
  • Experience with cyber threat intelligence, digital forensics, red teaming, threat hunt, cloud incident response, counterintelligence, or detection engineering
  • Knowledge of cybersecurity standards and the implementation of industry best practices
  • Knowledge of external standards, including ISO 22301, ISO 22317, and NIST guidelines such as NIST 800-53 or NIST 800-61
  • Ability to work a rotating shift schedule supporting a 24/7 environment
  • TS/SCI clearance
  • HS diploma or GED
  • DoD 8140 baseline Level II Certification
  • Experience with advanced Microsoft Office products
  • Experience with cyber technologies and capabilities, including continuous monitoring, incident response, advanced threat hunt, secure Cloud and mobile capabilities, ongoing assessment, digital forensics, and threat hunt
  • Experience with Cloud and DevSecOps
  • Experience with cybersecurity tools and solutions such as Microsoft Defender for Endpoint, Corelight, Suricata or Snort, Palo Alto and Cisco firewalls, Archer Case Management, ServiceNow, Threat Connect, Splunk Enterprise Security, Splunk SOAR, Cofense, IronPort Mail Gateways, or Microsoft G5 Defender suite
  • Possession of excellent verbal and written communication skills
  • Possession of excellent time management and analytical skills
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service