Booz Allen Hamilton-posted 9 months ago
$67,700 - $154,000/Yr
Full-time • Mid Level
Alexandria, VA
Professional, Scientific, and Technical Services

As a security operations center analyst, you're in the middle of the action, responding to and mitigating threats in real time. You're the first line of cyber defense for your organization, and they look to you for guidance on best practices and security measures. We need a Tier 2 SOC analyst like you to help us secure critical infrastructure from the constant onslaught of cyber attacks for defense. We are seeking an experienced SOC Tier 2 Analyst to join our Security Operations Center (SOC) team. In this role, you will be responsible for investigating security incidents, analyzing threats, and coordinating response efforts. You will serve as an escalation point for Tier 1 analysts and play a key role in improving our security posture by enhancing detection, response, and remediation capabilities.

  • Perform in-depth analysis of security events and escalations.
  • Investigate alerts, anomalies, and potential security incidents using SIEM, IDS/IPS, EDR, and other security tools.
  • Conduct threat hunting and proactive identification of malicious activity.
  • Lead and coordinate incident response efforts, including containment, eradication, and recovery.
  • Develop and refine detection rules, alerts, and SOC playbooks.
  • Perform forensic analysis on compromised hosts and networks.
  • Assist with vulnerability management and threat intelligence analysis.
  • Provide mentorship and guidance to Tier 1 analysts.
  • Stay current with emerging threats, attack techniques, and industry best practices.
  • Ensure compliance with security policies, frameworks, and regulatory requirements.
  • 3+ years of experience in a SOC, incident response, or cybersecurity role.
  • Experience in analyzing logs, network traffic, and malware behaviors.
  • Experience with incident response frameworks such as NIST or MITRE ATT&CK.
  • Experience with scripting and automation such as Python or PowerShell.
  • Knowledge of threat intelligence and cyber kill chain methodologies.
  • Knowledge of security tools, including SIEM such as Elastic, QRadar, Sentinel, EDR such as CrowdStrike or Microsoft Defender, and IDS/IPS.
  • Ability to work in a 24/7 shift-based environment as needed.
  • Ability to obtain a Secret clearance.
  • Bachelor's degree in Cybersecurity or Information Technology.
  • Possession of strong analytical and problem-solving skills.
  • Possession of strong verbal and written communication skills.
  • Secret clearance.
  • Security certifications such as GCIH, GCIA, CEH, or CISSP preferred.
  • Health, life, disability, financial, and retirement benefits.
  • Paid leave.
  • Professional development.
  • Tuition assistance.
  • Work-life programs.
  • Dependent care.
  • Recognition awards program for exceptional performance.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service