Logo
RIVA Solutions

Security Operations Center (SOC) Analyst

RIVA Solutions, Washington, District of Columbia, us, 20022

Save Job

Description

Title: SOC Analyst Location: Washington, DC - Onsite Terms: Full-time Clearance: Active Secret or Top-Secret clearance required (U.S. Citizenship required) Travel: Minimal;

Provide cyber threat analysis and reporting to support SOC operations and overall program situational awareness. Actively monitor security threats, risks, and alerts using SOC monitoring tools. Track investigation results and prepare detailed reports on findings. Provide first-tier response to security incidents and support incident tracking activities. Lead shifts and functional incident response (IR) teams, ensuring oversight and accountability. Support Tier 2 operations during critical or high-volume events. Conduct in-depth analyses of security incidents to identify compromises, determine root causes, and recommend remediation strategies. Perform intrusion scope assessments, develop and implement remediation strategies, and support recovery activities. Recommend process changes to strengthen defense and response procedures. Create and recommend new detection content to improve event monitoring. Conduct malware analysis in isolated environments, including both static and dynamic analysis of complex malware. Evaluate indicators of compromise (IOCs) and intelligence feeds for viability and disposition. Perform network forensics and deep packet inspection to identify threats. Propose and implement countermeasures to detect and prevent future security incidents. Support knowledge management efforts and assist in developing SOC policies and procedures, including during SOC stand-up activities. Minimum Qualifications

Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or a related field; OR equivalent security certifications (e.g., CompTIA Security+, CISSP, GCIH, GCIA). Minimum of 4 years of professional experience in security operations, incident response, or cyber threat analysis. U.S. Citizenship required. Active Secret or Top-Secret clearance. Strong understanding of SOC operations, incident detection, and response workflows. Familiarity with malware analysis, network forensics, and packet-level inspection. Excellent analytical, problem-solving, and communication skills. - Perform SOC analysis and incident triage - Conduct monthly proactive threat hunts and deliver reports to the government. - Collaborate with cyber teams for incident escalation and coordinated response. Preferred Qualifications

Advanced certifications such as CISSP, GIAC (GCFA, GCIH, GCIA), or equivalent. Prior experience supporting Department of Commerce, NTIA, or other federal civilian agencies. Experience with SIEM platforms, intrusion detection/prevention systems, and endpoint monitoring tools. Familiarity with NIST Cybersecurity Framework and Risk Management Framework (RMF). Experience contributing to the development and maturation of SOC processes and playbooks. Salary

Omitted for this role per customer instruction.

RIVA Benefits

Paid Time Off / Sick Leave Health, Dental, and Vision Coverage Life Insurance 401K Retirement Plan with Company Match HSA/FSA Spending Accounts Long- and Short-term Disability Pet Insurance Wellness Program Initiatives RIVA Flex (Flex Hours and Hybrid Work Support) Additional Perks & Workplace Benefits

Equal Opportunity Statement

RIVA Solutions is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or any protected class. If you need a reasonable accommodation to search for a job opening or to submit an online application, please email [email protected]. Only messages left for this purpose will be returned.