CSOC Analyst T2 responsible for addressing advanced cybersecurity challenges in Security Operations Centers. Leverage expertise for incident response and risk management at Nightwing's mission support services.
Responsibilities
Identification of Cybersecurity problems which may require mitigating controls.
Analyze network traffic to identify exploit or intrusion related attempts.
Recommend detection mechanisms for exploit and or intrusion related attempts.
Provide subject matter expertise on network based attacks, network traffic analysis, and intrusion methodologies.
Escalate items which require further investigation to other members of the Threat Management team.
Execute operational processes in support of response efforts to identified security incidents.
Participates in a team of Security operations engineers investigating alerts, anomalies, errors, intrusions, malware, etc. to identify the responsible, determine remediation, and recommend security improvements.
Follows precise analytical paths to determine the nature and extent of problems being reported by tools, e-mails, etc.
Follows strict guidance on reporting requirements.
Keeps management informed with precise, unvarnished information about security posture and events.
Promotes standards-based workflow both internally and in coordinating with US-CERT.
Engages with other internal and external parties to get and share information to improve processes and security posture.
Supervises and guide team efforts.
Communicates to CISO leadership.
Produces design documentation.
Leads analyzing/investigating reports or anomalies.
Requirements
Must be eligible to obtain a sensitive clearance – Position of Public Trust.
Must have 5+ years of relevant work experience.
Must have experience in: Endpoint Detection and analysis, Sysmon log analysis, IT security, Network traffic analysis.
Knowledge of Control Frameworks and Risk Management techniques.
Strong understanding of IDS/IPS technologies, trends, vendors, processes and methodologies.
Strong understanding of common IDS/IPS architectures and implementations.
Strong understanding of IDS/IPS signatures, content creation and signature characteristics including both signature and anomaly-based analysis and detection.
Certifications (one or more desired) DOD 8570.1-M Compliance at IAT Level II; CISSP, Certified Ethical Hacker (C|EH), Sec+, SFCP, GCIA, ISSEP, ISSMP, GCIH, GCFA, CSLC, CISM, or CCNA.
U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance.
Benefits
Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services.
The ability to obtain and maintain a U.S. government issued security clearance is required.
Excellent interpersonal and organizational skills.
Collaborate with cross-functional teams to deliver high-quality security incident resolutions.
SOC Analyst II providing tier II cybersecurity support in a Security Operations Center environment. Conducting vulnerability assessments and analyzing cyber threats while training junior staff members.
Security Operations Analyst responsible for monitoring and responding to cybersecurity threats. Ensuring the confidentiality, integrity, and availability of data per compliance standards.
SOC Analyst responsible for cybersecurity incident management at Algosystems in Greece. Monitoring security threats, conducting investigations, and improving SOC services.
Cyber Operations Lead ensuring coordination of cyber operations between the Security Operations Center and internal business units. Enhancing security through effective incident response and threat management initiatives.
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.
SOC Analyst L2 responsible for managing and analyzing security incidents in digital transformation. Contributing directly to the protection of companies and infrastructures.
Senior Manager leading global IT security operations to protect company data and assets at Keenova. Overseeing incident response, monitoring, and cybersecurity capabilities with strategic oversight.