Logo
JCS Solutions LLC

SOC - Cybersecurity Analyst

JCS Solutions LLC, Alexandria, Virginia, us, 22350


JCS Solutions LLC (JCS) is a premier technology firm specializing in enterprise-wide capabilities including cloud and infrastructure solutions, cyber security, digital modernization, next generation technologies enablement, software solutions, and mission support services dedicated to providing the highest quality of services and solutions. JCS delivers expert management consulting and information technology (IT) solutions to federal agencies.

We are a learning organization that promotes a work culture of collaboration, inclusiveness, inspiration and innovation.

JCS has been certified as a

Great Place to Work

four years in a row and wasawarded as Washington Post’s

Top Places to Work for 2024 .

Our employees embody our core values, and we are looking for others who do too!Customer Experience:

Strive for excellence and delight our clientsInnovation:

Embrace creative thinking to enable continual growth and powerful solutionsAccountability:

Take ownership of and pride in our actions and service deliveryInspire:

Be inspired to be your best self and have fun in the processIntegrity:

Do the right thing, the right way, every time!

Summary:

JCS Solutions LLC (JCS) is seeking a Security Operations Center (SOC) – Cybersecurity Analyst to join our growing team supporting a Department of Defense project within the National Capital Region (NCR). This position has a direct impact on maintaining and improving the security pf a Primary IT and cyber security service provider.

This is a Night Shift position (10pm-6am) and an active TS/SCI is required. Tuesday through Saturday. This position offers an excellent opportunity to be part of a high-performing team responsible for supporting a high-velocity collaborative environment, along with tremendous growth potential. If you are interested in a challenge and a great working environment, apply today!

What you will do:

The specific duties include but are not necessarily limited to the following:

This is a Night Shift position (10pm-6am) and an active TS/SCI is required. Tuesday through Saturday.Utilize alerts from endpoints, IDS/IPS, netflow, and custom sensors to identify compromises on customer networks/endpoints.Perform junior- to intermediate-level review of massive log files, pivot between data sets, and correlate evidence for incident investigations.Pass triaged alerts to senior-level SOC personnel and assist in identifying malicious actors on customer networks.Document analysis, findings, and actions in a case/knowledge management system.Support senior-level SOC personnel with the creation and distribution of incident reports to customers and higher headquarters.

To be successful, you should have:

Desired Skills and Experience:

Demonstrated hands-on experience analyzing high volumes of logs, network data (e.g. NetFlow, Full Packet Capture), and other attack artifacts in support of incident investigations.In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g., ArcSight, Splunk, Nitro/McAfee Enterprise Security Manager, QRadar, LogLogic).Experience and proficiency with any of the following: Anti-Virus, HIPS/HBSS, IDS/IPS, Full Packet Capture, Network Forensics.Experience with malware analysis concepts and methods.Unix/Linux command line experience.Scripting and programming experience.Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings.Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.Required Skills and Experience:

Must have an active DoD TS/SCIBachelor's degree and 7+ years of prior relevant experience; additional work experience or Cyber courses/certifications may be substituted in lieu of degree.3+ years of prior incident handling/response experienceExperience working in a SOC environment is requiredCND experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization.Demonstrated understanding of the cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs)Demonstrated sound understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.Motivated self-started with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findingsDoD 8570 IAT level II or higher certification such as CompTIA Security+ CE, ISC2 SSCP, SANS, GSEC prior to startingDoD 8570 CSSP-A level certification such as CEH, CySA+, GCIA or other certification prior to startingStrong analytical and troubleshooting skillsWilling to perform shift work, including weekends

It is JCS’ policy to promote equal employment opportunities and celebrate diversity. All qualified applicants will receive consideration for employment without regard to sex, race, color, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law.

#J-18808-Ljbffr