SOC Analyst
A recognized services organization in the Greater Washington, D.C. area is currently seeking a new SOC Analyst to monitor, detect, and respond to security events and incidents using industry-leading tools and methodologies.
About the Opportunity:
-
Assignment Length 6+ months
-
Location: In the Greater Washington, D.C. area
-
Shift: Afternoons / Evenings or Nights
-
Hours : 1pm to 11pm or 9pm to 6am
-
Note: This is a U.S. citizen-only position requiring the ability to obtain a Public Trust clearance
Responsibilities:
-
Monitor and analyze security alerts and events in a SOC environment
-
Use SIEM tools (Splunk or equivalent) to investigate and escalate incidents
-
Support incident response and documentation efforts
-
Collaborate with team members to improve detection and response capabilities
-
Communicate technical information effectively, both verbally and in writing
-
Perform other duties, as needed
Qualifications
-
1+ year of experience in a Security Operations Center environment or a recent college graduate with applicable industry certifications
-
Functional experience with a variety of operating systems, including Windows, Linux, or UNIX
-
Experience with Splunk or similar SIEM tools
-
Excellent written and verbal communication skills
Desired Skills:
-
Industry certifications, such as: CSIS, CEH, CSTA, CSTP, GCFE, CISSP, GCIH, GCIA, GPEN
-
IDS Log Analysis experience
-
Experience with Packet Capture tools and analysis
-
Knowledge of common network protocols and services: FTP, HTTP, SSH, SMB, LDAP
The openings are for:
2nd shift: 1p-11p
3rd shift 9p-6a