ECS is seeking a Security Operations Center (SOC) Junior Analyst to work remotely.
IronVine Security, an ECS company, is a rapidly growing information security and information technology company in Washington, DC. We are looking to hire a Junior Cyber Security Analyst to provide a full range of cyber security services on a long-term contract in Washington, DC. The position is full time/permanent and will support a Government Contract. The position is available immediately upon finding a qualified candidate with the appropriate background clearance.
Position Responsibilities:
- Perform hunting for malicious activity across the network and digital assets
- Respond to computer security events, incidents and conduct threat analysis
- Identify and act on malicious or anomalous activity
- Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity.
- Perform detailed investigation and response activities for security incidents
- Provide accurate and priority driven analysis on cyber activity/threats
- Perform payload analysis of packets
- Recommend implementation of countermeasures or mitigating controls
- Ensure all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment
- Collaborate with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity
- Mentor junior staff in cybersecurity techniques and processes
- Create and continuously improve standard operating procedures used by the SOC
- Resolve or coordinate the resolution of cyber security events
- Monitor incoming event queues for potential security incidents
- Create, manage, and dispatch incident tickets
- Monitor external event sources for security intelligence and actionable incidents
- Maintain incident logs with relevant activity
- Document investigation results, ensuring relevant details are passed to SOC Lead, Incident Response team and stakeholders
- Participate in root cause analysis or lessons learned sessions
- Write technical articles for knowledge sharing
- Establish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the Information Technology organization, as well as business units
Salary Range: $65,000 - $80,000
General Description of Benefits
Qualifications
- Detailed understanding of NIST Special Publication 800-61 Revision 2, Computer Security Incident Handling Guide
- Excellent problem solving, critical thinking, and analytical skills
- Exceptional working knowledge of TCP/IP Networking and the OSI model
- In-depth knowledge of the Intelligence driven defense utilizing the Cyber Kill Chain (CKC) and MITRE ATT&CK frameworks.
- Experience analyzing endpoint, network, firewall and intrusion prevention logs
- Significant experience with packet analysis via Wireshark
- Strong working knowledge of Splunk and Web Application Firewall experience
- Working knowledge of Windows and Linux command-line tools
- Strong working knowledge Hypertext Transfer Protocol, DNS and business email compromise framework
Certifications/Licenses:
- Bachelor's degree in Computer Science or related field or equivalent work experience
- CompTIA Security+
- EC Council Certified Ethical Hacker (CEH)
- Formal IT Security/Network Certification such as SANS GIAC Certified Intrusion Analyst (GCIA), SANS GIAC Network Forensic Analyst (GNFA) or SANS GIAC Certified Incident Handler (GCIH), preferred