Job Title: SOC Analyst II
Location:
Clearance Level: Active DoD - Public Trust
Salary Range: $84,000 - $126,000
Required Certification(s):
· At least one of the following or equivalent IT certifications: CEH (Certified Ethical Hacker), GSEC (GIAC Security Essentials), GCIH (GIAC Certified Incident Handler), Security+
SUMMARY Agile Defense Company is currently seeking a talented and ambitious self-starting, Mid Level SOC (Day Shift) Analyst for a challenging position supporting one of our premier clients who conducts 24/7 operations to secure their enterprise environment. This is a unique opportunity for the right candidate to embed themselves into the next generation of operational environments which is now taking place across the US government and commercial sectors.
Role is remote, but candidates must be local to the Washington, D.C. area.
JOB DUTIES AND RESPONSIBILITIES
· The existing team is a multi-faceted interdisciplinary set of experts with ever-increasing prowess in this unique atmosphere. Our security operations project is aimed at establishing innovative techniques for a comprehensive, cloud-first network enclave defense, identifying the emerging threats, and detecting malicious activity using advanced toolsets provided in the Microsoft cloud security ecosystem. The ideal candidate will have hands-on experience as a Cyber Defense analyst performing Incident Response and Intrusion Detection on a large operational network, specifically, utilizing the Microsoft Sentinel SIEM and related security portals.
QUALIFICATIONS Required Certifications
· At least one of the following or equivalent IT certifications: CEH (Certified Ethical Hacker), GSEC (GIAC Security Essentials), GCIH (GIAC Certified Incident Handler), Security+
Education, Background, and Years of Experience
· A minimum of 3 years direct experience providing SOC support, including performing log and event review and incident response.
ADDITIONAL SKILLS & QUALIFICATIONS Required Skills
· Demonstrated proficiency with M365 Defender and Azure Sentinel. (PREFERRED)
· Demonstrated experience leveraging KQL (or similar query language) in support of SOC duties.
· Demonstrated experience leveraging SIEM, SOAR and other tools to identify threat activity and incidents.
· Demonstrated experience in delivering effective written and verbal communication and collaboration skills.
· Demonstrated experience in providing SOC support with accuracy for effected resolution and documentation purposes.
· Demonstrated experience in supporting multiple cybersecurity incidents simultaneously.
· Demonstrated experience in adapting easily to learning new technologies.
· Demonstrated ability to follow written and verbal instructions.
· Demonstrated experience with problem solving new incidents without knowledgebase articles.
· Demonstrated experience with creating and editing SOP and incident reports.
Preferred Skills
·
WORKING CONDITIONS Environmental Conditions
· Day Shift, 6am-6pm - rotating schedule for days
Strength Demands
· Light – 20 lbs. Maximum lifting with frequent lift/carry up to 10 lbs. A job is light if less lifting is involved but significant walking/standing is done or if done mostly sitting but requires push/pull on arm or leg controls.
Physical Requirements
· Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel