Gray Tier Technologies is a seeking SOC Analyst Tier 1 in Las Vegas, Nevada to support a brand new customer and mission providing cyber security services to support Department of Energy initiatives.
The Tier 1 Cyber Analyst will review threat data from various sources and perform cyber threat intelligence analysis, correlate actionable security events/campaigns from various sources, perform network traffic analysis using raw packet data, net flow, IDS, IPS, and custom sensor output as it pertains to the cyber security of communication networks. Conducts analysis providing indicators for enterprise defensive measures. Interfaces with external entities including law enforcement organizations, intelligence community organizations and other government agencies as required.
Primary Responsibilities:
- Conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution and establishing countermeasures to increase cyber resiliency.
- Work with peers to conduct host-based and network-based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (e.g., signatures, rules etc.); and cyber threat intelligence.
- Provide support to the Security Operations Center during incident response and threat hunting activities that includes cyber threat analysis support, research, recommending relevant remediation and mitigation.
- Develop and maintain new reports of Cyber Threat Intelligence analysis to peers, management, and customer teams for purposes of situational awareness and making threat intelligence actionable.
- Provide support to the Security Operations Center during incident response and threat hunting activities that includes cyber threat analysis support, research, recommending relevant remediation and mitigation.
- Work with peers to conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution and establishing countermeasures to increase cyber resiliency.
- Normal working hours are 7-3PM M-F, however actual hours may vary depending on mission requirements.
Basic Qualifications:
- BA/BS degree and 2-4 years of prior relevant experience, add'l experience may be considered in lieu of degree.
- GIAC Certified Incident Handler (or equivalent), Certified Ethical Hacker (or equivalent) and Security + are required.
- Experience extrapolating indicators of compromise and relevant TTPs to apply them to new and existing cyber threat defense tools e.g., applying updates to IPS/IDS tools and SIEM content views.
- Experience reviewing IOCs and TTPs from classified sources and extrapolating them for consumption within an unclassified environment for direct implementation into cyber defense tools.
- Experience and proficiency in developing and presenting, both verbally and in writing, highly technical information and presentations to non-technical audiences at all levels of the organization. Audiences for this information include, but are not limited to, senior executives at NNSA and other agencies. Experience collecting intelligence, analyzing seemingly unrelated intelligence, and extracting meaning or relevance from the data. and creating relevant intelligence reports.
- Strong written and verbal communication skills and must be capable of the understanding, documenting, and communicating technical issues in a non-technical manner
- Working knowledge of Microsoft Word, Project, PowerPoint, and Excel for the purpose of documentation and presentation of deliverables
- Understanding of MITRE Attack framework
- US Citizen
- Q or TS Clearance.