Cybersecurity Operations Center Lead

Booz Allen HamiltonFort Belvoir, VA
23h

About The Position

As a security operations center analyst, you’re in the middle of the action, responding to and mitigating threats in real time. You’re the first line of cyber defense for your organization, and they look to you for guidance on best practices and security measures. We need a Tier 2 SOC analyst like you to help us secure critical infrastructure from the constant onslaught of cyber attacks for the US Army. On our SOC team, you’ll oversee efforts to find the advanced threats that are escaping detection, by analyzing logs, forensic data, and threat intelligence. Using your deep understanding of your client’s networks combined with your cyber security experience, you’ll analyze patterns to understand attackers’ goals and stop them from succeeding. Once your team finds the adversary, you’ll advise on ways to close the gaps and harden the client's network. Let’s outsmart malicious actors and secure the US Army. Join us. The world can’t wait.

Requirements

  • 7+ years of experience working in a Security Operations Center at a Classified level
  • Experience with continuous monitoring security for business units and key stakeholders, performing extensive analysis to validate established security requirements, and recommending additional security requirements and safeguards
  • Ability to serve as subject matter expert on vulnerabilities, including system and application settings, to work alongside other security analysts in event handling and incident response, perform as a focal point for the incident response, and communicate with other stakeholders
  • TS/SCI clearance
  • Bachelor's degree
  • Ability to obtain an 8570 DoD approved CSSP baseline certification, including CEH, CFR, CCNA Cyber Ops, CCNA-Security, CySA+, GCIA, GCIH, GICSP, Cloud+, SCYBER, or PenTest+ certification before start date

Nice To Haves

  • 7+ years of experience working in a Security Operations Center at a Classified level in the DoD preferred
  • Experience Using Elastic for monitoring and analysis
  • Experience using endpoint tools to successfully hunt for adversarial behavior
  • Knowledge of Splunk and creating Splunk content, including alerts and dashboards
  • Ability to conduct threat hunting using network and host-based information
  • TS/SCI clearance with a polygraph
  • Bachelor's degree in a STEM field preferred
  • Splunk, Tanium, or TYCHON certification

Benefits

  • health
  • life
  • disability
  • financial
  • retirement benefits
  • paid leave
  • professional development
  • tuition assistance
  • work-life programs
  • dependent care
  • recognition awards program
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service