Logo
Scout Solutions Inc Defunct

Tier II SOC Analyst

Scout Solutions Inc Defunct, Pasco, Washington, us, 99302


Tier II SOC Analyst Washington D.C. / Hybrid Job Overview We are currently seeking a Tier II Cybersecurity Analyst to provide support to our client in Washington D.C. Clearance Required: Candidate must be able to receive a Public Trust 6c Clearance Responsibilities and Duties Provide Tier 2 support by analyzing network traffic and various log data to determine the threat/impact against the network, recommending appropriate countermeasures, facilitating the tracking, handling, and reporting of all security events and computer incidents. Remediate and apply lessons learned to security incident investigation and resolution. Perform monitoring, identification and resolution of security events to detect threats through analysis, investigations and prioritization of events based on risk/exposure. Develop processes that analyze data and produce accurate, meaningful, easily interpreted results based on user requirements and use cases. Develop processes that align with enterprise incident response activities and coordinate closely with other teams within the Security Operations Center . Create custom tool content to enhance capabilities of security operations teams. Manage the collection, documentation and research of security events generated by the SOC monitoring platform and infrastructure. Perform Security Incident Management aligned with NIST standards. Technical writing experience: Standard Operating Procedures Concept of Operations (CONOPS) Incident Response Plans Training Exercises Tool configurations and content creation Qualifications 1-3 years of experience on one of the following team(s): Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC). Bachelors' degree in Computer Science, Information Technology or related technical field. Additional years of experience can be substituted for a degree. Experience with Security Information and Event Management (SIEM) Systems, Anti-Virus, Intrusion Detection Systems, Firewalls, Active Directory, and large Enterprise or Cloud environments. Experience with Incident Response, analysis of network traffic, log analysis, ability to prioritize and differentiate between potential intrusion attempts and false alarms, managing and tracking investigations to resolution. Good interpersonal skills to interact with customers, team members and support personnel. Strong analytical and problem solving skills for investigating security issues. Familiarity with one of the following; NIST Incident Response Lifecycle, Cyber Kill Chain, Adversarial Tactics, Techniques & Common Knowledge (ATT&CK). At least one active security certification Experience with one or more of the following tools: Azure Advanced Threat Analytics Azure Log Analytics Windows Defender Security McAfee ePO, HIPS FireEye NX, EX/ETP, HX, AX Desired Qualifications: Programming and/or scripting language experience; ideally PowerShell Search query language experience & content creation; ideally Kusto Project management experience to help build tiger teams for special projects MS Office, Visio, PowerBI proficiency