SOC Analyst providing security infrastructure operations support at Leidos. Engaging in incident response and management while collaborating with multiple defense agencies.
Responsibilities
Provide SOC and Incident Response support, including coordination, execution, and implementation of all actions required for the containment, eradication, and recovery measures for events and incidents
Monitor and reply to events and alerts from the SIEM, monitoring tools, and other network tools
Investigate events of interest and escalating to senior NOC / SOC members
Drive incidents from discovery to closure and reporting, with comprehension of escalation procedures and criteria
Categorize incidents & events, and partner with appropriate authorities in the production of security incident reports
Coordinate with other DISA organizations, activities, and other services as appropriate to de-conflict blue / red team activity with open incidents/events
Build timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions
While not in a period of incident response, conduct continuous exercises and dry runs to improve response outcomes in the event of a cyber-incident
Provide cybersecurity root-cause analysis in support of any tickets for which it fails to meet the Acceptable Quality Levels (AQLs)
Investigate compromised endpoints, identifying IOCs within the environment and conveying to users and other teams impact of discovered events.
Requirements
Bachelor’s degree and 5+ years of relevant experience
Must have an active DoD IAT Level II certification, prior to start (e.g. Sec+, CISSP)
Incident Response experience
Knowledge of MITRE ATT&CK principles
Systems administration experience - desktop and server systems connected to local and wide area networks
Troubleshooting skills and knowledge of a troubleshooting methodology
Knowledge Management skills to follow and create documentation
Security Incident Response Orchestration Lead at Bank of America defining automation for security incident workflows with a focus on Splunk SOAR and Tines. Collaborating with security operations and engineering teams to implement scalable solutions.
SOC Analyst II providing tier II cybersecurity support in a Security Operations Center environment. Conducting vulnerability assessments and analyzing cyber threats while training junior staff members.
Security Operations Analyst responsible for monitoring and responding to cybersecurity threats. Ensuring the confidentiality, integrity, and availability of data per compliance standards.
SOC Analyst responsible for cybersecurity incident management at Algosystems in Greece. Monitoring security threats, conducting investigations, and improving SOC services.
Cyber Operations Lead ensuring coordination of cyber operations between the Security Operations Center and internal business units. Enhancing security through effective incident response and threat management initiatives.
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.
SOC Analyst L2 responsible for managing and analyzing security incidents in digital transformation. Contributing directly to the protection of companies and infrastructures.