Staffing Resource Group, Inc
Overview
SOC Analyst
Location:
Washington DC
Industry:
Dept. of Defense / Cybersecurity
Employment Type:
Permanent Placement
Clearance:
Active Top Secret clearance with SCI Eligibility
Schedule:
Monday to Friday, 8am to 5pm
Summary:
We are actively searching for a skilled SOC Analyst to join our defense client’s team. The successful candidate will play a vital part in protecting national security infrastructure by identifying, analyzing, and responding to complex cyber threats. They will lead efforts in threat detection, packet analysis, and incident response, while mentoring junior analysts and supporting advanced defense strategies in partnership with federal stakeholders.
Responsibilities
Install, configure, and maintain network TAPs in production environments, ensuring optimal placement for comprehensive traffic visibility while minimizing network disruption
Perform regular TAP health monitoring, firmware updates, port configuration changes, and proactive maintenance to ensure continuous data capture reliability and compliance with customer infrastructure requirements
Monitor, analyze, and respond to network traffic using TAP-based data capture tools and intrusion detection systems
Perform advanced packet-level analysis and investigate anomalies to identify threats and incidents
Correlate alerts and log data across multiple sources to determine severity and impact
Coordinate incident response activities and ensure proper documentation and escalation procedures
Develop detection rules, custom scripts, and tuning for SIEM and IDS/IPS systems
Mentor junior analysts, provide training on detection techniques, and contribute to SOPs
Support cyber hunt operations, threat modeling, and forensic analysis as needed
Collaborate with government customers, law enforcement, and other partners in secure environments
Maintain strict adherence to classification protocols and data handling procedures
Additional duties as assigned.
Qualifications
Active Top Secret clearance required
Bachelor’s degree in Cybersecurity, Information Technology, Computer Science or related engineering field preferred; equivalent military or professional experience may be considered in lieu of degree
Minimum 5+ years of hands-on experience in a SOC or cyber threat analysis role
5+ years of overall experience in cybersecurity or information systems environments
DoD 8570 IAT II Certification required (Sec+, CISSP, GCIH, CYSA+)
Proficiency in packet analysis tools such as Wireshark, TCPdump, and Suricata
Familiarity with SIEM platforms (e.g., Splunk, QRadar, Elastic)
Experience with EDR/XDR tools, IDS/IPS, and log analysis
Understanding of TAP implementations and encrypted traffic analysis
In-depth understanding of cyber kill chain, attacker TTPs, and threat landscape
Comfortable with Windows, Linux, and cloud security monitoring environments
Preferred
One or more additional certification is preferred: GCIA, GCIH, GNFA, GCTI, CEH, CISSP, or Cisco CyberOps Professional
Strong working knowledge of government cyber policy, RMF, and FedRAMP preferred
EOE/ADA SRG Government Services is a leading provider of information technology, training, engineering, accounting and intelligence analytical services for agencies in the intelligence, defense, homeland security, cyber security, and federal civilian markets. SRG utilizes an innovative approach to identify and qualify talent that is unique to the federal contracting industry, featuring a cutting edge platform that allows us to rapidly and precisely match professionals to client requirements. We have a proprietary database of over one million candidates and maintain continuous contact with our qualified talent.
Labels:
EOE/ADA
Note:
This posting is for SOC Analyst with active TS/SCI eligibility; all candidates must meet clearance requirements.
#J-18808-Ljbffr
Location:
Washington DC
Industry:
Dept. of Defense / Cybersecurity
Employment Type:
Permanent Placement
Clearance:
Active Top Secret clearance with SCI Eligibility
Schedule:
Monday to Friday, 8am to 5pm
Summary:
We are actively searching for a skilled SOC Analyst to join our defense client’s team. The successful candidate will play a vital part in protecting national security infrastructure by identifying, analyzing, and responding to complex cyber threats. They will lead efforts in threat detection, packet analysis, and incident response, while mentoring junior analysts and supporting advanced defense strategies in partnership with federal stakeholders.
Responsibilities
Install, configure, and maintain network TAPs in production environments, ensuring optimal placement for comprehensive traffic visibility while minimizing network disruption
Perform regular TAP health monitoring, firmware updates, port configuration changes, and proactive maintenance to ensure continuous data capture reliability and compliance with customer infrastructure requirements
Monitor, analyze, and respond to network traffic using TAP-based data capture tools and intrusion detection systems
Perform advanced packet-level analysis and investigate anomalies to identify threats and incidents
Correlate alerts and log data across multiple sources to determine severity and impact
Coordinate incident response activities and ensure proper documentation and escalation procedures
Develop detection rules, custom scripts, and tuning for SIEM and IDS/IPS systems
Mentor junior analysts, provide training on detection techniques, and contribute to SOPs
Support cyber hunt operations, threat modeling, and forensic analysis as needed
Collaborate with government customers, law enforcement, and other partners in secure environments
Maintain strict adherence to classification protocols and data handling procedures
Additional duties as assigned.
Qualifications
Active Top Secret clearance required
Bachelor’s degree in Cybersecurity, Information Technology, Computer Science or related engineering field preferred; equivalent military or professional experience may be considered in lieu of degree
Minimum 5+ years of hands-on experience in a SOC or cyber threat analysis role
5+ years of overall experience in cybersecurity or information systems environments
DoD 8570 IAT II Certification required (Sec+, CISSP, GCIH, CYSA+)
Proficiency in packet analysis tools such as Wireshark, TCPdump, and Suricata
Familiarity with SIEM platforms (e.g., Splunk, QRadar, Elastic)
Experience with EDR/XDR tools, IDS/IPS, and log analysis
Understanding of TAP implementations and encrypted traffic analysis
In-depth understanding of cyber kill chain, attacker TTPs, and threat landscape
Comfortable with Windows, Linux, and cloud security monitoring environments
Preferred
One or more additional certification is preferred: GCIA, GCIH, GNFA, GCTI, CEH, CISSP, or Cisco CyberOps Professional
Strong working knowledge of government cyber policy, RMF, and FedRAMP preferred
EOE/ADA SRG Government Services is a leading provider of information technology, training, engineering, accounting and intelligence analytical services for agencies in the intelligence, defense, homeland security, cyber security, and federal civilian markets. SRG utilizes an innovative approach to identify and qualify talent that is unique to the federal contracting industry, featuring a cutting edge platform that allows us to rapidly and precisely match professionals to client requirements. We have a proprietary database of over one million candidates and maintain continuous contact with our qualified talent.
Labels:
EOE/ADA
Note:
This posting is for SOC Analyst with active TS/SCI eligibility; all candidates must meet clearance requirements.
#J-18808-Ljbffr