Post Job Free
Sign in

Host based Systems Analyst /Senior SOC Analyst

Company:
Node.Digital
Location:
Arlington, VA
Posted:
May 09, 2024
Apply

Description:

Job Description

Host-based Systems Analyst /Senior SOC Analyst

Location: Arlington, VA

Must have an active Secret Security Clearance

Node provides remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based and network-based cybersecurity analysis capabilities. Contract personnel provide-front-line response for digital forensics/incident response (DFIR) and proactively hunt for malicious cyber activity.

Node is seeking a Senior SOC Analyst to support this critical customer mission.

Responsibilities:

- Assisting Federal team leads with establishing and operating a Security Operations Center responsible for securing a highly dynamic environment supporting Incident Response and Threat Hunting experts

- Configuring and monitoring the Security Information and Event Management (SIEM) platform for security alerts.

- Scanning and monitoring system vulnerabilities on servers and infrastructure devices using a Threat and Vulnerability security solution; coordinating artifact collection operations.

- Assesses network topology and device configurations identifying critical security concerns and providing security best practice recommendations

- Collects network intrusion artifacts (e.g., PCAP, domains, URIs, certificates, etc.) and uses discovered data to enable mitigation of potential Computer Network Defense incidents

- Collects network device integrity data and analyzes for signs of tampering or compromise

- Analyzes identified malicious network and system log activity to determine weaknesses exploited, exploitation methods, effects on system and information

- Characterize and analyze artifacts to identify anomalous activity and potential threats to resources

- Assist with the development of processes and procedures to improve incident response times, analysis of incidents, and overall SOC functions

- Research and test new security tools/products and make recommendations for tools to be implemented in the SOC environment

- Planning, coordinating, and directing the inventory, examination, and comprehensive technical analysis of computer-related evidence

- Distilling analytic findings into executive summaries and in-depth technical reports

- Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack

Requirements

Required Skills:

- U.S. Citizenship

- Must have an active Secret clearance, TS/SCI preferred

- Must be able to obtain DHS Suitability

- Must demonstrate being a self-starter and give examples of leadership in customer-facing roles

- 8+ years of directly relevant experience in security operations using leading-edge technologies and industry-standard tools

- Experience with the analysis and characterization of cyber attacks

- Skilled in identifying different classes of attacks and attack stages

- Knowledge of system and application security threats and vulnerabilities

- In-depth knowledge of CND policies, procedures, and regulations

- In-depth knowledge and experience of network topologies - DMZs, WANs, etc. and use of Palo Alto products

- In-depth knowledge and experience of Wifi networking

- In-depth knowledge of TCP/IP protocols such as ICMP, HTTP/S, DNS, SSH, SMTP, SMB,

- Experience using Elastic SIEM

- Experience with vulnerability assessment and monitoring tools such as Security Center, Nessus, and Endgame

- Experience with reconstructing a malicious attack or activity based on network traffic

- Experience incorporating Threat Intelligence

- Experience with Crowdstike, Gray Noise and Shodan

-Understanding of MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK)

- Must be able to work collaboratively across physical locations.

Desired Skills:

-Proficiency in Elastic SIEM engineering

-Proficiency with Snort

-Proficiency with other EDR Tools (Crowdstrike, Carbon Black, etc)

-Proficiency with network analysis software (e.g. Wireshark)

-Proficiency with carving and extracting information from PCAP data

-Proficiency with non-traditional network traffic (e.g. Command and Control)

-Proficiency with preserving evidence integrity according to standard operating procedures or national standards

-Proficiency with designing cyber security systems and environments in a Linux

-Proficiency with virtualized environments

-Proficiency in conducting all-source research.

Required Education:

BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma and 10+ years of host or digital forensics and network forensic experience

Desired Certifications:

- GSOM, GSOC, GCFA, GCFE, EnCE, CCE, CFCE, CEH, CCNA, CCSP, CCIE, OSCP, GNFA

Company Overview:

Node. Digital is an independent Digital Automation & Cognitive Engineering company that integrates best-of-breed technologies to accelerate business impact.

Our Core Values help us in our mission. They include:

OUR CORE VALUES

Identifying the~RIGHT PEOPLE~and developing them to their full capabilities

Our customer’s “Mission” is our “Mission”. Our~MISSION FIRST~approach is designed to keep our customers fully engaged while becoming their trusted partner

We believe in~SIMPLIFYING~complex problems with a relentless focus on agile delivery excellence

Our mantra is “~Simple*Secure*Speed~” in the delivery of innovative services and solutions

Benefits

We are proud to offer competitive compensation and benefits packages to include:

Medical

Dental

Vision

Basic Life

Long-Term Disability

Health Saving Account

401K

Three weeks of PTO

10 Paid Holidays

Pre-Approved Online Training

Apply