SOC Analyst providing security infrastructure operations support at Leidos. Engaging in incident response and management while collaborating with multiple defense agencies.
Responsibilities
Provide SOC and Incident Response support, including coordination, execution, and implementation of all actions required for the containment, eradication, and recovery measures for events and incidents
Monitor and reply to events and alerts from the SIEM, monitoring tools, and other network tools
Investigate events of interest and escalating to senior NOC / SOC members
Drive incidents from discovery to closure and reporting, with comprehension of escalation procedures and criteria
Categorize incidents & events, and partner with appropriate authorities in the production of security incident reports
Coordinate with other DISA organizations, activities, and other services as appropriate to de-conflict blue / red team activity with open incidents/events
Build timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions
While not in a period of incident response, conduct continuous exercises and dry runs to improve response outcomes in the event of a cyber-incident
Provide cybersecurity root-cause analysis in support of any tickets for which it fails to meet the Acceptable Quality Levels (AQLs)
Investigate compromised endpoints, identifying IOCs within the environment and conveying to users and other teams impact of discovered events.
Requirements
Bachelor’s degree and 5+ years of relevant experience
Must have an active DoD IAT Level II certification, prior to start (e.g. Sec+, CISSP)
Incident Response experience
Knowledge of MITRE ATT&CK principles
Systems administration experience - desktop and server systems connected to local and wide area networks
Troubleshooting skills and knowledge of a troubleshooting methodology
Knowledge Management skills to follow and create documentation
Cybersecurity Analyst at Trust Control monitoring threats and responding to incidents in the SOC. Engaging in continuous learning to enhance cybersecurity practices and strategies.
SecOps Engineer responsible for maintaining and improving application security in cloud infrastructure at Shopmonkey. Collaborating on security tools and processes with a focus on compliance and incident management.
Senior SOC Analyst at Telstra helping protect employees and customers from cyber threats. Leading incident response and threat analysis in Security Operations Centre.
Physical Security Operations Manager leading physical security initiatives and managing guard operations for data center construction. Focused on protecting assets and mitigating risks in critical environments.
Cybersecurity Analyst focusing on threat detection and incident response. Collaborating on vulnerabilities and ensuring a secure client environment at PwC.
Associate Director leading Game Security Operations for Activision across enforcement and threat intelligence disciplines. Ensuring daily effectiveness and strategic development of security across Activision titles.
Senior Incident Response Engineer leading advanced security responses focused on Microsoft E5 security at Acrisure. Collaborating across teams for robust incident management and security policy enforcement.
Senior Director of Product Marketing coordinating go - to - market strategy for endpoint security solutions at Tanium. Leading cross - functional teams to enhance product positioning and market impact.
SecOps Engineer implementing infrastructure security solutions in AWS and GCP at Tala. Focused on vulnerability management and protection in a global financial infrastructure company.
SOC Manager leading cybersecurity operations and strategies for federal clients in a 24/7 environment. Managing SOC activities and mentoring teams while maintaining security integrity.