SOC Analyst

Employer
Marathon TS
Location
Washington, DC
Posted
Apr 20, 2017
Closes
Apr 21, 2017
Function
Analyst
Hours
Full Time
We are looking to add SOC Analysts to work on our team supporting a new contract to the Department of Homeland Security. Candidates should have the following experience: ACTIVE SECRET CLEARANCE or HIGHER 1st, 2nd, and 3rd shifts available. Candidates must have extensive experience working with various security methodologies and processes, advanced knowledge of TCP/IP protocols, experience configuring and implementing various of technical security solutions, extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices. Must possess expert knowledge in two or more of the following areas: Vulnerability Assessment, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Encryption, Web‐filtering, Advanced Threat Protection. Minimum five (5) years of professional experience in incident detection and response, malware analysis, or cyber forensics, and a bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. Candidates shall also have 3+ years of specialized experience in Cyber Intelligence: incident detection and response and/or cyber intelligence analysis, and a bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. Must have at least one of the following certifications: SANS GIAC: GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GSNA, GPPA, GAWN, GWEB, GNFA, GREM, GXPN, GMON or GCIH ISC2 CCFP, CCSP, CISSP Cisco: CCNA, CCNP CERT CSIH EC Council: CEH, ENSA, CNDA, ECSS, ECSP, ECES, CHFI, LPT, ECSA, or ECIH Offensive Security: OSCP, OSCE, OSWP and OSEE EnCase: EnCE Dod 8570: IAT L2, CNDSP Analyst or IR Carnegie Mellon: SEI, CCSIH Desired: - Experience in DHS, cyber government, and/or federal law enforcement. - Experience with Cyber Kill Chain. Stop publication Candidates shall also have specialized experience in one of the following areas: a) Monitoring and Detection Analyst: Candidates shall have a minimum of three (3) years of professional experience in cybersecurity, information risk management, or information systems risk assessment, and must be knowledgeable in many areas such as: Vulnerability Assessments, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Data Loss Prevention, Encryption, Two‐Factor Authentication, Web‐filtering, and Advanced Threat b) Incident Response Analyst: Candidates shall have a minimum of three (3) years of professional experience responding to information system security incidents and an ability to use the DHS furnished toolset to identify and determine root causes of incidents and provide any required documentation and possible evidence to authorized personnel who carry legal or investigative c) Cyber Intelligence Analyst: Candidates shall have at least three (3) years of professional experience in incident detection and response and/or cyber intelligence analysis, and a bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field