Logo
Tyto Athene, LLC

Tier 2 SOC Lead

Tyto Athene, LLC, Washington, District of Columbia, us, 20022


Tyto Athene is searching for a

Tier 2 SOC Lead

to support a law enforcement customer in Washington DC. We believe our Security Operations Center (SOC) analysts form the backbone of our cybersecurity services. This candidate will play a critical role in conducting in-depth analyses and responding to incidents of potential cyber threats facing our clients. In addition to being our initial point of contact for end users, you will serve as the escalation point for junior analysts, helping guide them through more complex and high-priority incidents.Responsibilities:Utilize security tools to analyze, investigate, and triage security alertsMonitor our customers environments, including cloud and SaaS solutions for evidence of adversarial activityPerform in-depth analysis and investigation of high-priority cybersecurity incidentsUtilize advanced tools, such as host-based digital forensics or malware analysis capabilities, to identify incidents' root causes, scope, and impactCollaborate with cyber threat hunting and cyber threat intelligence teamsParticipate in the development, implementation, and tuning of the SOC tools detection content and alerting signatures.Accurately document triage findings and intake reports of external cybersecurity events from SOC customers via phone or email in the SOCs Incident Management System(IMS)Learn new open and closed-source investigative techniquesPerform research into emerging threats and vulnerabilities to aid their prevention and mitigationHelp shape the evolution of processes and procedures of the SOCProvide guidance and mentorship to Tier 1 SOC Analysts to enhance their skills and capabilitiesRequired:Minimum of six (6) years of cybersecurity experience with at least three (3) years in a SOC watch floor analyst or IR roleBachelor's Degree or higher in Cybersecurity or related is preferredCISSP or CEH certification; additional experience, formal training, certifications, and/or education may be substitutable at the client's discretionExperience in some of the following SOC tools and technologies: IDS/IPS, EDR, SIEM, XPS, FireEye, RSA Netwitness, Sourcefire (Snort), Silo, etcStrong analytical and organizational skillsStrong verbal and written communication skillsExperience with MS Word and other MS Office applicationsDesired:Previous SOC or incident response experienceWorking knowledge of regex and scripting languagesUnderstanding how EO14028 and OMB M-21-31 impact federal SOCsAny SOC analyst relevant certifications such as those from GIAC or CompTIAThe initiative to ask for assistance and offer fresh ideas to improve the SOC's performanceShift:

Multiple Shift options depending on availabilityClearance:

TS/SCI EligibilityLocation:

This is a hybrid role with expectations of being on the client site a minimum 2 days on site.