Please scroll down, To apply

Tier 3 SOC Analyst with Security Clearance

hiring now
New job

Base One Technologies

2024-11-05 21:39:16

Job location Washington, District of Columbia, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

Our DC metro based client is looking for Tier 3 SOC Analyst. Local candidates are preferred. In person meeting is required prior hiring. US CITIZENSHIP AND ACTIVE TS ARE required for these openings.rnrn rnrnTier 3 AnalystrnrnAll Tier 3 Analyst candidates shall have a minimum of seven (7) years of professional experience in incident detection and response, malware analysis, or cyber forensics, or a bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field and a minimum of five (5) years of experience in incident detection and response, malware analysis, or cyber forensics. The candidates must have extensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations, evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations.rnrnOf the seven (7) years of professional experience requirements above, Tier 3 Analyst candidates shall have the following specialized experience for their position:rnrn rnrnMonitoring and Detection AnalystrnrnShall have a minimum of five (5) years of professional experience in security, information risk management, or information systems risk assessment, and must be knowledgeable in many areas such as: Vulnerability Assessments, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Data Loss Prevention (DLP), Encryption, Two-Factor Authentication, Web-filtering, and Advanced Threat Protection.rnrn rnrnIncident Response AnalystrnrnShall have a minimum of five (5) years of professional experience responding to information system security incidents. Ability to use the DHS furnished toolset to identify and determine root causes of incidents and provide any required documentation and possible evidence to security investigators.rnrn rnrnVulnerability Assessment AnalystrnrnShall have at least five (5) years of professional experience in vulnerability assessment and penetration testing.rnrn rnrnCyber Intelligence AnalystrnrnShall have at least five (5) years of professional experience in collecting, synthesizing, fusing, or authoring unclassified and classified cyber threat intelligence products.rnrn rnrnSOC Tool Engineering, Operations and MaintenancernrnShall have at least three (3) years of professional experience in incident detection and response, and at least three (3) years of experience in system administration, database administration, network engineering, software engineering, or software development, and a bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. rnrn rnrn rnrnIf you are interested in this opening, please forward a copy of your most recent resume in word format to

Inform a friend!

<!– job description page –>
Top