What are the responsibilities and job description for the Senior SOC Analyst (TS/SCI - Onsite) position at Improvix Technologies?
Senior SOC Analyst
Location: Washington, D.C. (Onsite – 5 days per week)
Clearance Required: Active TS/SCI Security Clearance
About The Role
We are seeking an experienced Senior SOC Analyst to lead efforts in monitoring, detecting, and responding to cybersecurity threats within a federal IT environment. This role requires a seasoned professional who can analyze alerts, investigate suspicious activities, implement mitigation strategies, and drive improvements to security operations. As a senior leader within the SOC, you’ll mentor junior analysts, refine security processes, and provide technical expertise to strengthen the organization’s overall cybersecurity posture.
Key Responsibilities
Location: Washington, D.C. (Onsite – 5 days per week)
Clearance Required: Active TS/SCI Security Clearance
About The Role
We are seeking an experienced Senior SOC Analyst to lead efforts in monitoring, detecting, and responding to cybersecurity threats within a federal IT environment. This role requires a seasoned professional who can analyze alerts, investigate suspicious activities, implement mitigation strategies, and drive improvements to security operations. As a senior leader within the SOC, you’ll mentor junior analysts, refine security processes, and provide technical expertise to strengthen the organization’s overall cybersecurity posture.
Key Responsibilities
- Monitor security alerts and events using SIEM tools.
- Collaborate with leadership to refine and execute cybersecurity strategies aligned with regulatory requirements and industry best practices.
- Serve as a technical authority in threat detection, incident response, vulnerability management, and risk assessment.
- Assess, design, and implement advanced security architecture solutions.
- Identify, prioritize, and mitigate cybersecurity risks in collaboration with cross-functional teams.
- Lead and coordinate incident response efforts, ensuring timely and effective resolution of security incidents.
- Provide mentorship and training to enhance cybersecurity awareness across the organization.
- Conduct security audits, assessments, and forensic investigations to uncover root causes and remediation strategies.
- Perform real-time log and network traffic analysis to identify anomalies.
- Conduct threat intelligence analysis to proactively address emerging threats.
- Develop and update SOC processes, playbooks, and incident response plans.
- Prepare reports and recommendations to improve the organization’s security posture.
- 7 years of experience in a SOC environment.
- Active TS/SCI security clearance.
- Demonstrated expertise in identifying, analyzing, and responding to security incidents using SIEM and threat intelligence platforms.
- Strong skills in containment, mitigation, and resolution of cybersecurity incidents.
- Deep understanding of network protocols, firewalls, and endpoint security solutions.
- Hands-on experience with system logs, packet captures, and forensic data analysis.
- Excellent documentation skills with the ability to communicate findings to technical and non-technical stakeholders.
- Experience with automation tools and scripting to streamline SOC operations.
- Knowledge of ITIL frameworks, incident management, and service desk processes.
- Experience managing complex incident response scenarios and threat hunts.
- Familiarity with advanced security automation and orchestration tools.
- Strong presentation and reporting skills for executive-level briefings.