SOC Analyst providing security infrastructure operations support at Leidos. Engaging in incident response and management while collaborating with multiple defense agencies.
Responsibilities
Provide SOC and Incident Response support, including coordination, execution, and implementation of all actions required for the containment, eradication, and recovery measures for events and incidents
Monitor and reply to events and alerts from the SIEM, monitoring tools, and other network tools
Investigate events of interest and escalating to senior NOC / SOC members
Drive incidents from discovery to closure and reporting, with comprehension of escalation procedures and criteria
Categorize incidents & events, and partner with appropriate authorities in the production of security incident reports
Coordinate with other DISA organizations, activities, and other services as appropriate to de-conflict blue / red team activity with open incidents/events
Build timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions
While not in a period of incident response, conduct continuous exercises and dry runs to improve response outcomes in the event of a cyber-incident
Provide cybersecurity root-cause analysis in support of any tickets for which it fails to meet the Acceptable Quality Levels (AQLs)
Investigate compromised endpoints, identifying IOCs within the environment and conveying to users and other teams impact of discovered events.
Requirements
Bachelor’s degree and 5+ years of relevant experience
Must have an active DoD IAT Level II certification, prior to start (e.g. Sec+, CISSP)
Incident Response experience
Knowledge of MITRE ATT&CK principles
Systems administration experience - desktop and server systems connected to local and wide area networks
Troubleshooting skills and knowledge of a troubleshooting methodology
Knowledge Management skills to follow and create documentation
Security Operations Center Analyst managing incidents and security alerts for 7 - Eleven stores. Focusing on in - depth analysis and proactive monitoring within a state - of - the - art Security Operations Center.
Security Operations Manager at Qnity managing physical security programs across global sites. Overseeing operations and collaborating with cross - functional teams to mitigate risk and maintain secure facilities.
SOC Analyst monitoring security events and responding to incidents at Junglee Games. Collaborating on security protocols to ensure protection of digital assets.
Senior Director of Global Security Operations at CyrusOne strategizing and managing security across global data centers. Driving execution, governance, and operational excellence in a high - availability environment.
Cybersecurity generalist at PwC providing security solutions and maintaining the protection of client systems. Involves monitoring security alerts, incident response, and collaboration with stakeholders.
Security Operations Manager overseeing safety measures for corporate office locations and events at Whatnot. Responsible for developing security frameworks and managing vendor relationships across global operations.
Manager overseeing technical security operations for the Protection Services department. Responsible for managing security systems, staff training, and interdepartmental collaboration.
Principal in Security Monitoring Response at Mastercard managing global crises and resilience operations. Leading incident response efforts and ensuring the safety of people and assets.
SOC Analyst II providing real time security monitoring and threat hunting services for clients in various industries. Assisting in identifying security incidents and managing vulnerabilities.