SOC Analyst - Tier 1 (ONSITE)

Posted 21 Hours Ago
Be an Early Applicant
Washington, DC
Junior
Information Technology
The Role
The SOC Analyst - Tier 1 is responsible for monitoring security alerts, responding to incidents, analyzing security data, and coordinating remediation efforts. This role involves real-time monitoring, incident response analysis, and supporting cyber defense operations in collaboration with other teams.
Summary Generated by Built In

Job Title: SOC Analyst - Tier 1 (ONSITE)
Location: Washington, DC
Duration: 12 Months+
Job Description:
The Client is the central technology organization of the Client. It sets the standard for a number of information technology functions including the security policies and procedures for the District's IT footprint. The Client as the lead in this Endeavor. The Client team is looking for 2 Tier 1 Security Analysts. Each role is responsible for monitoring The Security Operations Center by responding to alerts, notification, communications and providing incident response activities such as tracking the incident, communication with stakeholders, remediation and recovery actions and reporting pertaining to security incidents. The analysts follow standard operating procedures for detecting, classifying, and reporting incidents under the supervision of Tier 2 and Tier 3 staff.
Roles and Responsibilities:

  • Perform real-time monitoring of internal and information technology security equipment and systems to determine operational status and performance making use of various Security Incident and Event Management (SIEM) tools, SOAR platforms and other related security management/console applications, such as network traffic and data analytics.
  • Analyze both raw and processed security alert and event data to identify potential security incidents, threats, mitigations, and vulnerabilities.
  • Support follow-on actions, such as coordinating with other organization teams to facilitate remediation of the alert/event/incident, and close out the investigation.
  • Perform initial alert/event/incident triage used for investigation.
  • Initiate incident notification, case tracking/management, recovery actions, and report status updates.
  • Perform incident response analysis uncovering attack vectors involving a variety of malware, data exposure, and phishing and social engineering methods.
  • Coordinate process and procedure actions with geographically separated team members.


Detailed Tasks: Incident Response

  • Support and develop reports during and after incidents, which include all actions taken to properly mitigate, recover and return operations to normal operations.
  • Participate in the remediation of incidents and responses that are generated from live threats against the enterprise.
  • Coordinate and provide technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.
  • Assist in real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs).


Desired Background

  • Bachelors’ degree in either: Computer Science, Engineering, Information Technology, Cyber Security, or equivalent experience in Cyber/IT roles (SOC experience preferred, but not required) preferred Cyber Security Certifications such as CompTIA Security+
  • Excellent written and oral communication skills.
  • Self-motivated and able to work in an independent manner.


Compliance

  • Understand, enforce, and adhere to the company policies and procedures.
  • Have read and understand the Information Security Policy and supporting procedures and do not hinder in any way the proper execution of procedures defined within.
  • Understand and abide by our non-disclosure and confidentiality agreements.
  • Expertise in implementing, administrating and operating information security technologies such as firewalls, IDS/IPS, SIEM, Antivirus, network traffic analyzers and malware analysis tools.
  • Utilizes advanced experience with scripting and tool automation such as Perl, PowerShell, Regex.
  • Develops, leads, and executes information security incident response plans.
  • Develops standard and complex IT solutions & services, driven by business requirements and industry standards.
  • May also leverage dynamic and static code assessment tools to measure vulnerability of applications throughout the SDLC.


Minimum Education/Certification Requirements:

  • BS Degree in IT, Cybersecurity, or Engineering, or equivalent experience


Skills:
 

Skills Required / Desired Amount of Experience Implementing, administering, and operating IS tech such as firewalls, IDS/IPS, SIEM, Antivirus, net traffic analyzers, and malware analysis Required 1 Years Utilizing advanced experience with scripting and tool automation such as Perl, PowerShell, Regex Required 1 Years Developing, leading, and executing information security incident response plans Required 1 Years Developing standard and complex IT solutions & services, driven by business requirements and industry standards Required 1 Years BS Degree in IT, Cybersecurity, Engineering, or equivalent experience Required

Top Skills

Antivirus
Firewalls
Ids
Ips
Malware Analysis Tools
Network Traffic Analyzers
Perl
Powershell
Regex
SIEM
Soar
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Baltimore, MD
146 Employees
On-site Workplace

What We Do

Serigor provides IT Services and IT staffing to Government and Commercial enterprises of all sizes. Serigor has twelve years of proven track record in IT Services, Government Solutions, and Staffing Solutions.

● MBE/WBE/WBENC/WOSB company, headquartered in Baltimore, MD.

● Multiple, multi-year contracts with Government Agencies at State, County, City, and Federal.

● Commercial clients include Fortune 1000 and Start-Ups all over the US.

● Onshore and offshore IT delivery centers.

● IT solutions encompass contracts that are Fixed Price, T&M, Product Development in all technologies.

● Workforce and staffing solutions encompass contract, contract-to-hire, permanent placement and statement of work job assignments.

Similar Jobs

PwC Logo PwC

Acceleration Center: Financial Crimes Unit - Risk Architecture Data Scientist - Experienced Associate (Python/SQL)

Artificial Intelligence • Professional Services • Business Intelligence • Consulting • Cybersecurity • Generative AI
Hybrid
45 Locations
370000 Employees
66K-78K Annually

PwC Logo PwC

Data Architect- Manager

Artificial Intelligence • Professional Services • Business Intelligence • Consulting • Cybersecurity • Generative AI
Remote
Hybrid
67 Locations
370000 Employees
100K-232K Annually

PwC Logo PwC

Data Architect- Senior Associate

Artificial Intelligence • Professional Services • Business Intelligence • Consulting • Cybersecurity • Generative AI
Remote
Hybrid
67 Locations
370000 Employees
84K-202K Annually

PwC Logo PwC

Data Architect- Senior Manager

Artificial Intelligence • Professional Services • Business Intelligence • Consulting • Cybersecurity • Generative AI
Remote
Hybrid
67 Locations
370000 Employees
130K-256K Annually

Similar Companies Hiring

Jobba Trade Technologies, Inc. Thumbnail
Software • Professional Services • Productivity • Information Technology • Enterprise Web • Consulting • Cloud
Chicago, IL
45 Employees
InCommodities Thumbnail
Renewable Energy • Machine Learning • Information Technology • Energy • Automation • Analytics
Austin, TX
234 Employees
HERE Technologies Thumbnail
Software • Logistics • Internet of Things • Information Technology • Computer Vision • Automotive • Artificial Intelligence
Amsterdam, NL
6000 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account