Security Operations Center Technician
Job Summary/Company:Sparks Group is currently looking for SOC Analysts for Tier 1, Tier 2, and Tier 3 support for a large scale Federal Program with multiple task orders within the program. If you have 3 - 10+ years of professional work experience, this opportunity is for you!
â€¢ Act as network incident first responder for a 24/7 staffed SOC, reviewing and verifying system alerts
â€¢ Assist with the development of incident response plans, workflows, and SOPs
â€¢ Maintain security sensors and tools
â€¢ Monitor security sensors and review logs to identify intrusions
â€¢ Escalate security incidents using established policies and procedures
â€¢ Uses tools and techniques to perform initial extraction, de-obfuscation, or other manipulation of malware related data
â€¢ Perform initial analysis of security events, network traffic, and logs to engineer new detection methods, or create efficiencies when available
â€¢ Work directly with cyber threat intelligence analysts to convert intelligence into useful detection
â€¢ Collaborate with incident response team to rapidly build detection rules as needed
â€¢ Identify incident root cause and take proactive mitigation steps
â€¢ Perform lessons learned activities
â€¢ Review vulnerabilities and track resolution
â€¢ Review and process threat intel reports
â€¢ Implement detection use cases
â€¢ Implement IDS signatures
â€¢ Assist with incident response efforts
â€¢ Provide critical information for customer report briefs
â€¢ Participate in customer security assessments
â€¢ Participate in table top exercises
â€¢ Basic, yet experienced understanding of root causes of malware infections and proactive mitigation
â€¢ Basic, yet experienced understanding of lateral movement and footholds
â€¢ Basic, yet experienced understanding of data exfiltration techniques. Demonstrated ability in critical thinking, problem solving, and analytics
â€¢ Enjoy analyzing patterns looking for outliers
â€¢ Enjoy creating ways to find needles in haystacks
â€¢ Have real world experience analyzing complex attacks and understand TTPs of threat actors
â€¢ Define relationships between seemingly unrelated events through deductive reasoning
â€¢ Basic, yet experienced in network/host based intrusion analysis, malware analysis, forensics, and cyber threat intel
â€¢ Basic, yet experienced knowledge of advanced threat actors and complex attacks
â€¢ Possess excellent writing skills and the ability to communicate to teammates as well as technical and executive level staff
â€¢ Quick study with new tools
â€¢ Basic, yet experienced knowledge of Splunk
â€¢ Basic, yet experienced knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS)
â€¢ Basic, yet experienced technical understanding of operating systems, network architecture and design, Active Directory (AD) application log consumables, systems design as well as superior knowledge of technical operations process and procedures
â€¢ Basic, yet experienced knowledge of encryption, key management and cryptology
â€¢ Familiarity with the Risk Management Framework (NIST 800-37), Security Controls as described in NIST 800- 35, and the Federal Information Security Modernization Act (FISMA) operating standards and applicable guidelines
â€¢ Basic, yet experienced in performing threat modelling, risk analysis, root cause analysis, risk identification, and risk mitigation
â€¢ Basic, yet experience with planning and implementing secure networking practices such as: application segmentation, network segmentation, NAC and other access control testing/validation, updating access control SOPs
â€¢ Understanding of configurations and experience with an enterprise SIEM solution including signature tuning, development of correlation rules, reports, and alarms
â€¢ Organizational Skills: Proven ability to plan and prioritize work, both their own and that of project team. Follows tasks to their logical conclusion. Understanding of project management principles and techniques (project plans, critical path, etc.), ability to develop security project plans and work with development teams to integrate those into development schedules - in both waterfall and agile environments.
o Team Work: Excels both autonomously and as part of a team. Effective teammate.
o Leadership: Acute business acumen and understanding of organizational issues and challenges. Able to work effectively with participants at all levels in an organization.
o Communications: Ability to interact with managers, other staffers, and business unit (non- technical) customers clearly and efficiently, both verbally and in writing. Able to present ideas in a variety of ways depending upon audience and context. Excellent active listening skills.
o Problem Solving: Natural inclination for planning strategy and tactics. Ability to analyze problems and determine root cause, generating alternatives, evaluating and selecting alternatives and implementing solutions.
o Results oriented: Able to drive things forward regardless of personal interest in the task.
â€¢ CERT Certified Computer Security Incident Handler
â€¢ Electronic Commerce Council Certified Ethical Hacker (ECC - CEH)
â€¢ GIAC Information Security Fundamentals (GISF)
â€¢ ISC2 Certified Information System Security Professional (CISSP)
Qualified candidates should send their resume AND call Sparks Group for additional details. Please note, resume must include a valid email address in order to be considered. We look forward to discussing your background, your current job search, and your potential career path with Sparks Group!
Sparks Group is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, pregnancy, citizenship, family status, genetic information, disability, or protect veteran status.