Gray Tier Technologies

Soc Analyst Sr.

Full-Time in DC, US - Mid Level

Gray Tier Technologies is seeking a Senior SOC Analyst with an active Secret clearance to support our DOI customer's Security Operation Center in DC or Reston Virginia.

The Department of the Interior (DOI) protects America’s natural resources and heritage, honors our cultures and tribal communities, and supplies the energy to power our future. The DOI’s Office of the Chief Information Officer (OCIO), Cyber Security Division, is charged with protecting DOI’s information systems from ever-evolving Cyber Threats. The Cybersecurity Branch continuously evolves, develops, and updates its Cybersecurity capabilities in Order to mitigate constantly evolving threats most effectively.

Position responsibilities and requirements:

  • Bachelor’s Degree required
  • Minimum 6 years of experience required
  • Specialized Member of the Security Operations Center (SOC) team which could focus on Data Loss Prevention, SOAR Playbook development, Threat Hunt lead and/or Deputy SOC Chief.
  • Manages network security monitoring and incident response for a large organization, coordinates with other government agencies to record and report incidents.
  • Maintains records of security monitoring and incident response activities, utilizing case management and ticketing technologies.
  • Monitors and analyzes Security Information and Event Management (SIEM) to identify security issues for remediation.
  • Knowledge of creating Security Information Event Management (SIEM) tool rules.
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises through reviews and analyses of relevant event detail and summary information.
  • Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications, and operating systems.
  • Implements countermeasures or mitigating controls.
  • Consolidates and conducts comprehensive analysis of threat data obtained from classified, proprietary, and open-source resources to provide indication and warnings of impending attacks against unclassified and classified networks.
  • Recommend changes to Standard Operating Procedures and other similar documentation.
  • Generates end-of-shift reports for documentation and knowledge transfer to subsequent analysts on duty.
  • Prepares reports and monitors performance of subordinates.