Logo
Zachary Piper Solutions

Chief SOC Analyst

Zachary Piper Solutions, Washington

Save Job

Zachary Piper Solutions is seeking a highly skilled and experienced Chief Security Operations Center (SOC) Analyst to support the Federal Communications Commission (FCC) with 24/7/365 protection of critical systems over a pivotal 5 year federal contract. This position is fully onsite in Washington, D.C. and requires an active Top Secret clearance .

Responsibilities of the Chief SOC Analyst:

  • Direct all SOC operations and serve as the primary Incident Response (IR) authority.
  • Oversee continuous 24/7/365 monitoring of FCC security systems, including GSA’s MTIPS, TIC, and PEP platforms.
  • Conduct comprehensive Information Security GAP Analyses to identify and remediate vulnerabilities.
  • Lead and mentor cybersecurity and IR teams to enhance threat detection, containment, and resolution.
  • Coordinate closely with the Department of Commerce Enterprise SOC to ensure unified operations.
  • Ensure full compliance with NIST SP 800-61 guidelines and FCC-specific reporting protocols.
  • Manage incident response workflows, including alert triage, root cause analysis, and remediation efforts.
  • Drive proactive threat hunting and vulnerability assessments, including insider threat detection.
  • Supervise threat intelligence activities and maintain strategic documentation such as the Cyber Defense Playbook and SOC Communication Plan.
  • Develop, refine, and optimize SIEM, IDS, and IPS detection rules and content.

Qualifications for the Chief SOC Analyst:

  • U.S. citizenship and an active Top Secret (TS) security clearance (required).
  • Bachelor’s degree in Cybersecurity, Information Technology, or a closely related discipline (mandatory).
  • Minimum of 7 years of experience in SOC operations and incident response, with at least some in leadership roles (15+ years preferred).
  • Proven expertise in GAP analysis, cybersecurity operations, and alignment with NICE Work Roles (PD-WRL-003, -005, -006).
  • Industry certifications required: CISSP, GIAC Incident Response, and Microsoft Certified Security Operations Analyst Associate (copies must be provided).
  • Strong working knowledge of MTIPS, TIC, PEP systems, SIEM platforms, and NIST SP 800-61 standards.
  • Must be available for on-site work at FCC headquarters in Washington, D.C., and respond to critical incidents 24/7/365.
  • Core working hours: Monday–Friday, 6 AM to 6 PM .

Compensation and Benefits:

· $150,000 - $200,000 Dependent on experience

· Comprehensive Benefits: Medical, Dental, Vision, 401K, PTO, Sick Leave as required by law, and Holidays.

#LI-ONSITE

#LI-EA1

Security Operations Center, SOC Chief, cybersecurity leadership, incident response, IR lead, federal cybersecurity, FCC jobs, Top Secret clearance, TS clearance required, cyber threat detection, vulnerability assessment, insider threat hunting, SIEM tuning, IDS/IPS optimization, NIST 800-61, GAP analysis, MTIPS, TIC systems, PEP systems, cyber defense playbook, threat intelligence, SOC communication plan, 24/7 cybersecurity, federal contract, Washington DC cybersecurity, CISSP required, GIAC Incident Response, Microsoft Security Analyst, NICE Work Roles, PD-WRL-003, PD-WRL-005, PD-WRL-006, cyber operations, SOC monitoring, root cause analysis, alert triage, system resilience, enterprise SOC collaboration, cybersecurity compliance, federal cyber jobs, contract-to-hire, high-visibility role, cyber infrastructure protection, security analyst jobs, cybersecurity manager, cyber incident response, federal IT security, cyber threat mitigation, advanced threat detection, cybersecurity strategy, and critical infrastructure defense.

#J-18808-Ljbffr