Recent Searches

You haven't searched anything yet.

4 Security Operations Center (SOC) Analyst Jobs in Herndon, VA

SET JOB ALERT
Details...
ShorePoint
Herndon, VA | Full Time
7 Months Ago
TriSept Corporation
Herndon, VA | Other
$75k-93k (estimate)
2 Days Ago
Indotronix International Corp
Herndon, VA | Contractor
$104k-125k (estimate)
2 Days Ago
Security Operations Center (SOC) Analyst
ShorePoint Herndon, VA
Full Time | Business Services 7 Months Ago
Save

sadSorry! This job is no longer available. Please explore similar jobs listed on the left.

ShorePoint is Hiring a Security Operations Center (SOC) Analyst Near Herndon, VA

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a Security Operations Center (SOC) Analyst to work in a 24x7x365 SOC. This team will provide initial levels of incident identification, analysis, and triage. They will also provide baseline health reporting of the core SOC toolset, including availability of security log and data sources and integration of threat intelligence feeds. Proactive threat hunting will be a regular duty of the team. The team will mitigate incidents directly where possible, escalating incidents as needed to the Incident Response and Management Team. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market. 

Roles and Responsibilities

  • Perform Computer Security Incident Response activities for a large global enterprise, coordinate with other enterprise IT teams to record and report incidents
  • Work incidents from initial assignment to final resolution
  • Recognize potential, successful, and unsuccessful intrusion attempts and compromises through reviews and analysis of security tools
  • Author SOPs as needed or directed
  • Fully document assigned tickets to show all work performed
  • Create, track, and work to resolution Normal and Standard job-related Change Requests
  • Correlate network activity across networks to identify trends of unauthorized use
  • Reviews alerts and data from sensors and documents formal, technical incident reports
  • Track, update and close tickets expeditiously
  • Researches emerging threats and vulnerabilities to aid in the identification of network incidents
  • Analyzes data from threat and vulnerability feeds and analyzes data
  • Identifies and resolves false positive findings in assessment results
  • Makes real-time decisions about incidents as they occur

Required Skills

  • Strong analytical and technical skills in computer network defense operations, ability to lead efforts in Incident Handling (Detection, Analysis, Triage), Hunting (anomalous pattern detection and content management) and Malware Analysis.
  • Prior experience and ability to with analyzing information technology security events to discern true positive incidents from false positive events. This includes security event triage, incident investigation, implementing countermeasures, and conducting incident response.
  • Demonstrated capability to effectively monitor and investigate security incidents as well as make recommendations to improve the security posture of a large organization
  • Strong logical/critical thinking abilities, especially analyzing security events from host and network event sources e.g., windows event logs, AV, EDR, network traffic, IDS events for malicious intent).
  • Strong foundation of Network and Security skills, fundamental knowledge of Windows, Linux and Cisco operating systems, networking protocols and network traffic analysis
  • Previous hands-on experience with a Security Information and Event Monitoring (SIEM) platforms and/or log management systems that perform log collection, analysis, correlation, and alerting is required (preferably within Splunk).
  • Experience with IT security tools, working technical knowledge of network, server, storage and desktop hardware and software
  • Demonstrated ability to work with matrixed resources in a team environment
  • Excellent written and verbal communication skills

Education Requirement

  • BS/BA in Computer Science, Information Systems, Engineering, Business, Physical Science, or other technology-related discipline or 1 years of relevant experience is preferred

Years of Experience Requirement

  • 1-5 years desired but not required depending on demonstrated capability to perform required tasks

Certification Requirement

  • Security required. Additional desired certifications include: Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH)

Location

  • Remote

Security Clearance

  • Active Secret clearance required

Job Summary

JOB TYPE

Full Time

INDUSTRY

Business Services

POST DATE

09/23/2022

EXPIRATION DATE

09/30/2022

HEADQUARTERS

HERNDON, VA

SIZE

25 - 50

FOUNDED

2017

CEO

MATT BROWN

REVENUE

$5M - $10M

Show more

The job skills required for Security Operations Center (SOC) Analyst include Analysis, Computer Science, Networking, Operating System, Cybersecurity, Verbal Communication, etc. Having related job skills and expertise will give you an advantage when applying to be a Security Operations Center (SOC) Analyst. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Security Operations Center (SOC) Analyst. Select any job title you are interested in and start to search job requirements.

For the skill of  Computer Science
FWG Solutions
Other
$115k-142k (estimate)
1 Week Ago
For the skill of  Networking
MBI, Inc.
Contractor
$116k-143k (estimate)
1 Week Ago
Show more

The following is the career advancement route for Security Operations Center (SOC) Analyst positions, which can be used as a reference in future career path planning. As a Security Operations Center (SOC) Analyst, it can be promoted into senior positions as an Information Security Analyst IV that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Security Operations Center (SOC) Analyst. You can explore the career advancement for a Security Operations Center (SOC) Analyst below and select your interested title to get hiring information.

SEKON
Full Time
$149k-184k (estimate)
1 Month Ago