CSOC Analyst T2 responsible for addressing advanced cybersecurity challenges in Security Operations Centers. Leverage expertise for incident response and risk management at Nightwing's mission support services.
Responsibilities
Identification of Cybersecurity problems which may require mitigating controls.
Analyze network traffic to identify exploit or intrusion related attempts.
Recommend detection mechanisms for exploit and or intrusion related attempts.
Provide subject matter expertise on network based attacks, network traffic analysis, and intrusion methodologies.
Escalate items which require further investigation to other members of the Threat Management team.
Execute operational processes in support of response efforts to identified security incidents.
Participates in a team of Security operations engineers investigating alerts, anomalies, errors, intrusions, malware, etc. to identify the responsible, determine remediation, and recommend security improvements.
Follows precise analytical paths to determine the nature and extent of problems being reported by tools, e-mails, etc.
Follows strict guidance on reporting requirements.
Keeps management informed with precise, unvarnished information about security posture and events.
Promotes standards-based workflow both internally and in coordinating with US-CERT.
Engages with other internal and external parties to get and share information to improve processes and security posture.
Supervises and guide team efforts.
Communicates to CISO leadership.
Produces design documentation.
Leads analyzing/investigating reports or anomalies.
Requirements
Must be eligible to obtain a sensitive clearance – Position of Public Trust.
Must have 5+ years of relevant work experience.
Must have experience in: Endpoint Detection and analysis, Sysmon log analysis, IT security, Network traffic analysis.
Knowledge of Control Frameworks and Risk Management techniques.
Strong understanding of IDS/IPS technologies, trends, vendors, processes and methodologies.
Strong understanding of common IDS/IPS architectures and implementations.
Strong understanding of IDS/IPS signatures, content creation and signature characteristics including both signature and anomaly-based analysis and detection.
Certifications (one or more desired) DOD 8570.1-M Compliance at IAT Level II; CISSP, Certified Ethical Hacker (C|EH), Sec+, SFCP, GCIA, ISSEP, ISSMP, GCIH, GCFA, CSLC, CISM, or CCNA.
U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance.
Benefits
Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services.
The ability to obtain and maintain a U.S. government issued security clearance is required.
Excellent interpersonal and organizational skills.
Collaborate with cross-functional teams to deliver high-quality security incident resolutions.
Security Operations Center Analyst managing incidents and security alerts for 7 - Eleven stores. Focusing on in - depth analysis and proactive monitoring within a state - of - the - art Security Operations Center.
Security Operations Manager at Qnity managing physical security programs across global sites. Overseeing operations and collaborating with cross - functional teams to mitigate risk and maintain secure facilities.
SOC Analyst monitoring security events and responding to incidents at Junglee Games. Collaborating on security protocols to ensure protection of digital assets.
Senior Director of Global Security Operations at CyrusOne strategizing and managing security across global data centers. Driving execution, governance, and operational excellence in a high - availability environment.
Cybersecurity generalist at PwC providing security solutions and maintaining the protection of client systems. Involves monitoring security alerts, incident response, and collaboration with stakeholders.
Security Operations Manager overseeing safety measures for corporate office locations and events at Whatnot. Responsible for developing security frameworks and managing vendor relationships across global operations.
Manager overseeing technical security operations for the Protection Services department. Responsible for managing security systems, staff training, and interdepartmental collaboration.
Principal in Security Monitoring Response at Mastercard managing global crises and resilience operations. Leading incident response efforts and ensuring the safety of people and assets.
SOC Analyst II providing real time security monitoring and threat hunting services for clients in various industries. Assisting in identifying security incidents and managing vulnerabilities.