Junior SOC (Security Operations Center) Analyst

Washington, D.C

Applications have closed

Agile Defense

We are in the business of innovation through information technology and cybersecurity, delivered exceptionally.

View company page

Agile Defense provides leading-edge Digital Transformation solutions to support and advance our customers' mission. We deliver innovative and high-quality services to our customers worldwide through an empowered and engaged workforce.
Job Title: SOC Analyst I - Junior SOC (Security Operations Center) AnalystLocation: Hybrid - Washington, D.C.Clearance Level: Public Trust Required Certification(s): ·       An industry technical certification such as GCIH, MS-SC200 or equivalent.
SUMMARY: Agile Defense is currently seeking a talented and ambitious self-starting, Junior SOC (Security Operations Center) Analyst to join the Enterprise Security Operations Center (ESOC) team. This is a unique opportunity for the right candidate to embed themselves into the next generation of operational environments which is now taking place across the US government. The existing team is a multi-faceted interdisciplinary set of experts with ever-increasing prowess in this unique environment. Our security operations project is aimed at establishing innovative techniques for a comprehensive, cloud-first network enclave defense, identifying the emerging threats, and detecting malicious activity using advanced toolsets.
The SOC Analyst will join a team of multi-disciplinary experts to support a government agency's ESOC Incident Response (IR) capabilities. The SOC Analyst will be responsible for working as part of an integrated security team composed of federal employees and contractors from multiple companies The SOC analyst will also support the day-to-day IR activities and will be responsible for the daily review of security events.
JOB DUTIES AND RESPONSIBILITIES·       Investigate security events using various customer and industry tools to identify potential incidents and perform actions to contain incidents in progress.·       Monitor and analyze logs and alerts from a variety of different systems and tools across multiple platforms in order to respond and report suspected or actual security breaches.·       Develop procedures for use, interpretation, and response to the monitoring and alert information collected.·       Monitor security systems and events to detect and investigate threats, identify and analyze traffic trends, assess the impact of security alerts and traffic anomalies on the customer's network in order to make appropriate recommendations.·       Support daily and hourly monitoring of incident reporting email boxes.·       Support IR team activities in response to security incidents. Activities include but to limited to ensuring completion of the incident from detection thru closure, participating in IR meetings and sharing analysis with other branch/division stakeholders, providing situational awareness information to appropriate stakeholders, correlating multiple alerts and incidents to determine widespread attacks, and providing incident status reports to team management and other stakeholders/leadership.SUPERVISORY DUTIES·       This is a non-supervisory position.
QUALIFICATIONSRequired Certifications·       An industry technical certification such as GCIH, MS-SC200 or equivalent.Education, Background, and Years of Experience·       Bachelor's degree in Computer Science, or related field.·       3 years of experience in incident response with 1-2 years of experience in network defense environments preferred.
ADDITIONAL SKILLS & QUALIFICATIONSRequired Skills·       An industry technical certification such as GCIH, MS-SC200 or equivalent·       1 - 3 years of experience with tools such as Active Directory, Azure Active Directory, AD Connect, SAML, Kerberos, Cisco IOS, MS Server, Azure cloud environments, Incident Handling, Threat hunting experience, fundamental knowledge of IEEE 7 layers.·       Experience with deployment and documentation of enterprise project management and change management processes.·       Ability to identify solutions to potential network issues/embrace network simplification and strengthened security.·       Ability to conduct event triage and analysis and incident investigation.·       Ability to write threat reports and incident reports.·       Familiarity with NIST and DHS US-CERT incident response requirements and guidelines. Ability to work independently and with other teams.·       Excellent writing, interpersonal and communication skills using standard office automation tools (e.g. Microsoft Office_.Preferred Skills·       Understanding of command line scripting and implementation (e.g., Python, Powershell).·       Ability to write latest content/searches/scripts (e.g., Create dashboards, Sentinel alerts, Python scripts, Powershell scripts).·       Familiarity with differences in on-prem OPSEC in relation to cloud-based security.·       Strong understanding of networking (TCP Flags, TCP Handshake, IP addressing, Firewalls, Proxy, IDS, IPS).·       Ability to perform Netflow / packet capture (PCAP) analysis.·       Experience with cyber threat hunting.
WORKING CONDITIONSEnvironmental Conditions·       This is a remote position with 0% travel possible.Strength Demands·       Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles.  Some occasional walking or standing may be required.   Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.Physical Requirements·       Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; SeeEmployees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. We believe several attributes are the root of our very best employees and extraordinary culture. We have named these attributes “The 6 H’s” – Happy, Helpful, Honest, Humble, Hungry, and Hustle.
Happy: We exhibit a positive outlook in order to create a positive environment.Helpful: We assist each other and pull together as teammates to deliver.Honest: We conduct our business with integrity.Humble: We recognize that success is not achieved alone, that there is always more to learn, and that no task is below us.Hungry: We desire to consistently improve.Hustle: We work hard and get after it.
These Core Values are present in all our employees and our organization's aspects. Learn more about us and our culture by visiting us here.
COVID-19 Vaccination RequirementsAgile Defense is subject to federal vaccine mandates or other customer/facility vaccination requirements as a federal contractor. As such, to protect its employees' health and safety and comply with customer requirements, Agile Defense may require employees in certain positions to be fully vaccinated against COVID-19. Vaccination requirements will depend on the status of the federal contractor mandate and customer site requirements.

Equal Opportunity Employer/Protected Veterans/Individuals with DisabilitiesThe contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Active Directory Agile Automation Azure C CERT Clearance Cloud Computer Science Firewalls GCIH Government agency IDS Incident response iOS IPS Kerberos Monitoring NIST PCAP PowerShell Python SAML Scripting SOC

Perks/benefits: Team events

Regions: Remote/Anywhere North America
Country: United States
Job stats:  396  148  1

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.