SOC Cybersecurity Analyst - Journeyman

JCS Solutions LLCAlexandria, VA

About The Position

JCS Solutions LLC (JCS) is seeking a Security Operations Center (SOC) – Cybersecurity Analyst to join our growing team supporting a Department of Defense project within the National Capital Region (NCR). This position has a direct impact on maintaining and improving the security pf a Primary IT and cyber security service provider. This is a Shift (Days and Mids) Shift position, and an active TS/SCI is required. This position offers an excellent opportunity to be part of a high-performing team responsible for supporting a high-velocity collaborative environment, along with tremendous growth potential. If you are interested in a challenge and a great working environment, apply today!

Requirements

  • Must have an active DoD TS/SCI
  • Bachelor's degree and 4+ years of prior relevant experience; additional work experience or Cyber courses/certifications may be substituted in lieu of degree.
  • 2-3+ years of prior incident handling/response experience
  • Experience working in a SOC environment is required
  • CND experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization.
  • Demonstrated understanding of the life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
  • Demonstrated sound understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.
  • Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings
  • DoD 8570 IAT level II or higher certification such as CompTIA Security+ CE, ISC2 SSCP, SANS GSEC prior to starting.
  • DoD 8570 CSSP-A level Certification such as CEH, CySA+, GCIA or other certification prior to starting.
  • Demonstrated commitment to training, self-study and maintaining proficiency in the technical cybersecurity domain and an ability to think and work independently
  • Strong analytical and troubleshooting skills.
  • Willing to perform shift work, including weekend hours.

Nice To Haves

  • Demonstrated hands-on experience analyzing high volumes of logs, network data (e.g. NetFlow, Full Packet Capture), and other attack artifacts in support of incident investigations.
  • In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g., ArcSight, Splunk, Nitro/McAfee Enterprise Security Manager, QRadar, LogLogic).
  • Experience and proficiency with any of the following: Anti-Virus, HIPS/HBSS, IDS/IPS, Full Packet Capture, Network Forensics.
  • Experience with malware analysis concepts and methods.
  • Unix/Linux command line experience.
  • Scripting and programming experience.
  • Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings.
  • Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.

Responsibilities

  • Utilize alerts from endpoints, IDS/IPS, netflow, and custom sensors to identify compromises on customer networks/endpoints.
  • Perform junior- to intermediate-level review of massive log files, pivot between data sets, and correlate evidence for incident investigations.
  • Pass triaged alerts to senior-level SOC personnel and assist in identifying malicious actors on customer networks.
  • Document analysis, findings, and actions in a case/knowledge management system.
  • Support senior-level SOC personnel with the creation and distribution of incident reports to customers and higher headquarters.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service