Create Email Alert

Email Alert for

ⓘ There was an unexpected error processing your request.

Please refresh the page and try again.

If the problem persists, please contact us with your issue.

Email address is already registered

You can always manage your preferences and update your interests to ensure you receive the most relevant opportunities.

Would you like to [visit your alert settings] now?

Success! You're now signed up for Job Alerts

Get ready to discover your next great opportunity.

Similar Jobs

  • Serigor Inc

    SOC Analyst - Tier 1 (Onsite)

    Washington, DC, United States

    • Ending Soon

    Job Title: SOC Analyst - Tier 1 (Onsite) Location: Washington, DC Duration: 12 Months+ Job Description: The client is the central technology organization of the client Government. It sets the standard for a number of information technology functions including the security policies and procedures for the District's IT footprint. The Citywide Inf

    Job Source: Serigor Inc
  • CyBourn

    SOC Analyst - Tier 1

    Washington, DC, United States

    The Tier 1 Security Analyst is responsible for monitoring a 24x7x365 coordination center byresponding to alerts, notification, communications and providing incident response activities such as tracking the incident, communication with stakeholders, remediation and recovery actions and reporting pertaining to security incidents. The analysts follow

    Job Source: CyBourn
  • Warriors Recruiting

    Tier 3 SOC Analyst

    Vienna, VA, United States

    • Ending Soon

    Title: Tier 3 Security Operations Center (SOC) Analyst Location: Vienna, VA Position Overview: We are seeking a highly skilled Tier 3 Security Operations Center (SOC) Analyst to join our dynamic cybersecurity team. As a Tier 3 SOC Analyst, you will be responsible for advanced threat analysis, incident response, and forensic investigation to defen

    Job Source: Warriors Recruiting
  • Georgia IT Inc

    SOC Tier 2 Analyst -Washington, DC

    Greenbelt, MD, United States

    • Ending Soon

    SOC Tier 2 Analyst Location: Washington, DC - Onsite (Hybrid ) Duration: 6+ months The SOC Analyst Tier 2 will support the Security Operations Center and perform the duties detailed below. Responsibilities Perform investigations, threat hunting and work cases as needed Act as an escalation point for Tier 1 Communicate with customers regarding se

    Job Source: Georgia IT Inc
  • Demo - Maximus

    Tier 3 SOC Analyst (Secret clearance)

    Herndon, VA, United States

    • Ending Soon

    #techjob #clearance Job Summary Who We Seek: •Passion Seekers. You genuinely care about the work that you do and its impact on society. •Self-Starters. You’re a go-getter who isn’t afraid to step up and disrupt the status quo. •Entrepreneurs. You bring fresh ideas to the table, work hard, develop business and consistently seek new challenges. •Col

    Job Source: Demo - Maximus
  • Assyst

    Help Desk Analyst Tier -1

    Arlington, VA, United States

    ASSYST is seeking a Help Desk Analyst to provide tier 1 support via phone, portal, and email submitted Incident and Request tickets for our client at Arlington, VA. Job Location: Arlington VA (Hybrid) Job Schedule: 7AM to 4PM and 8AM to 5PM, Monday thru Friday (40 hours a week) Job Type: Full Time W2 'or' Contract (Corp to Corp/C2C or 109

    Job Source: Assyst
  • Deloitte

    Service Desk Analyst (Tier 1)_

    Washington

    Deloitte's Government and Public Services (GPS) practice - our people, ideas, technology and outcomes-is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of over 15,000+ professionals brings fresh perspective to help clients anticipate disruption, reimagine the possibl

    Job Source: Deloitte
  • Leidos

    Help Desk Analyst (Tier 1)

    Rockville, MD, United States

    Description Original Posting Date: 2024-06-17 While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above. Pay Range: Pay Range - The Leidos pay range for th

    Job Source: Leidos

SOC Analyst - Tier 1 (Onsite)

Washington, DC, United States

Job Title: SOC Analyst - Tier 1 (Onsite)

Location: Washington, DC

Duration: 12 Months+

Job Description:

The client is the central technology organization of the client Government. It sets the standard for a number of information technology functions including the security policies and procedures for the District's IT footprint. The Citywide Information Security serves as the lead in this endeavor.

The Citywide information security team is looking for 2 Tier 1 Security Analysts. Each role is responsible for monitoring The Security Operations Center by responding to alerts, notification, communications and providing incident response activities such as tracking the incident, communication with stakeholders, remediation and recovery actions and reporting pertaining to security incidents. The analysts follow standard operating procedures for detecting, classifying, and reporting incidents under the supervision of Tier 2 and Tier 3 staff.

Roles and Responsibilities Perform real-time monitoring of internal and information technology security equipment and systems to determine operational status and performance making use of various Security Incident and Event Management (SIEM) tools, SOAR platforms and other related security management/console applications, such as network traffic and data analytics.

Analyze both raw and processed security alert and event data to identify potential security incidents, threats, mitigations, and vulnerabilities.

Support follow-on actions, such as coordinating with other organization teams to facilitate remediation of the alert/event/incident, and close out the investigation.

Perform initial alert/event/incident triage used for investigation.

Initiate incident notification, case tracking/management, recovery actions, and report status updates.

Perform incident response analysis uncovering attack vectors involving a variety of malware, data exposure, and phishing and social engineering methods.

Coordinate process and procedure actions with geographically separated team members.

Detailed Tasks: Incident Response Support and develop reports during and after incidents, which include all actions taken to properly mitigate, recover and return operations to normal operations.

Participate in the remediation of incidents and responses that are generated from live threats against the enterprise.

Coordinate and provide technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.

Assist in real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs).

Desired Background Bachelors’ degree in either: Computer Science, Engineering, Information Technology, Cyber Security, or equivalent experience in Cyber/IT roles (SOC experience preferred, but not required)

preferred Cyber Security Certifications such as CompTIA Security+

Excellent written and oral communication skills.

Self-motivated and able to work in an independent manner.

Compliance Understand, enforce, and adhere to the company policies and procedures.

Have read and understand the Information Security Policy and supporting procedures and do not hinder in any way the proper execution of procedures defined within.

Understand and abide by our non-disclosure and confidentiality agreements.

Responsibilities: Expertise in implementing, administrating and operating information security technologies such as firewalls, IDS/IPS, SIEM, Antivirus, network traffic analyzers and malware analysis tools.

Utilizes advanced experience with scripting and tool automation such as Perl, PowerShell, Regex.

Develops, leads, and executes information security incident response plans.

Develops standard and complex IT solutions & services, driven by business requirements and industry standards.

May also leverage dynamic and static code assessment tools to measure vulnerability of applications throughout the SDLC.

Minimum Education/Certification Requirements: BS Degree in IT, Cybersecurity, or Engineering, or equivalent experience

Skills:

Skills Required / Desired Amount of Experience 1-5 yrs. implementing, administering, and operating IS tech such as firewalls, IDS/IPS, SIEM, Antivirus, net traffic analyzers, and malware analysis Required 1 Years 1-5 yrs. utilizing advanced experience with scripting and tool automation such as Perl, PowerShell, Regex Required 1 Years 1-5 yrs. developing, leading, and executing information security incident response plans Required 1 Years 1-5 yrs. developing standard and complex IT solutions & services, driven by business requirements and industry standards Required 1 Years BS Degree in IT, Cybersecurity, Engineering, or equivalent experience Required

#J-18808-Ljbffr

Apply

Create Email Alert

Create Email Alert

Email Alert for SOC Analyst - Tier 1 (Onsite) jobs in Washington, DC, United States

ⓘ There was an unexpected error processing your request.

Please refresh the page and try again.

If the problem persists, please contact us with your issue.

Email address is already registered

You can always manage your preferences and update your interests to ensure you receive the most relevant opportunities.

Would you like to [visit your alert settings] now?

Success! You're now signed up for Job Alerts

Get ready to discover your next great opportunity.