Improvix Technologies, Inc.
Senior SOC Analyst (TS/SCI - Onsite)
Improvix Technologies, Inc., Washington, District of Columbia, us, 20022
Senior SOC Analyst
Location:
Washington, D.C. (Onsite - 5 days per week) Clearance Required:
Active TS/SCI Security Clearance
About the Role
We are seeking an experienced
Senior SOC Analyst
to lead efforts in monitoring, detecting, and responding to cybersecurity threats within a federal IT environment. This role requires a seasoned professional who can analyze alerts, investigate suspicious activities, implement mitigation strategies, and drive improvements to security operations. As a senior leader within the SOC, you'll mentor junior analysts, refine security processes, and provide technical expertise to strengthen the organization's overall cybersecurity posture.
Key Responsibilities Monitor security alerts and events using SIEM tools. Collaborate with leadership to refine and execute cybersecurity strategies aligned with regulatory requirements and industry best practices. Serve as a technical authority in threat detection, incident response, vulnerability management, and risk assessment. Assess, design, and implement advanced security architecture solutions. Identify, prioritize, and mitigate cybersecurity risks in collaboration with cross-functional teams. Lead and coordinate incident response efforts, ensuring timely and effective resolution of security incidents. Provide mentorship and training to enhance cybersecurity awareness across the organization. Conduct security audits, assessments, and forensic investigations to uncover root causes and remediation strategies. Perform real-time log and network traffic analysis to identify anomalies. Conduct threat intelligence analysis to proactively address emerging threats. Develop and update SOC processes, playbooks, and incident response plans. Prepare reports and recommendations to improve the organization's security posture. Required Qualifications
7+ years of experience in a SOC environment. Active
TS/SCI security clearance . Demonstrated expertise in identifying, analyzing, and responding to security incidents using SIEM and threat intelligence platforms. Strong skills in containment, mitigation, and resolution of cybersecurity incidents. Deep understanding of network protocols, firewalls, and endpoint security solutions. Hands-on experience with system logs, packet captures, and forensic data analysis. Excellent documentation skills with the ability to communicate findings to technical and non-technical stakeholders. Experience with automation tools and scripting to streamline SOC operations. Knowledge of ITIL frameworks, incident management, and service desk processes. Preferred Skills
Experience managing complex incident response scenarios and threat hunts. Familiarity with advanced security automation and orchestration tools. Strong presentation and reporting skills for executive-level briefings.
Location:
Washington, D.C. (Onsite - 5 days per week) Clearance Required:
Active TS/SCI Security Clearance
About the Role
We are seeking an experienced
Senior SOC Analyst
to lead efforts in monitoring, detecting, and responding to cybersecurity threats within a federal IT environment. This role requires a seasoned professional who can analyze alerts, investigate suspicious activities, implement mitigation strategies, and drive improvements to security operations. As a senior leader within the SOC, you'll mentor junior analysts, refine security processes, and provide technical expertise to strengthen the organization's overall cybersecurity posture.
Key Responsibilities Monitor security alerts and events using SIEM tools. Collaborate with leadership to refine and execute cybersecurity strategies aligned with regulatory requirements and industry best practices. Serve as a technical authority in threat detection, incident response, vulnerability management, and risk assessment. Assess, design, and implement advanced security architecture solutions. Identify, prioritize, and mitigate cybersecurity risks in collaboration with cross-functional teams. Lead and coordinate incident response efforts, ensuring timely and effective resolution of security incidents. Provide mentorship and training to enhance cybersecurity awareness across the organization. Conduct security audits, assessments, and forensic investigations to uncover root causes and remediation strategies. Perform real-time log and network traffic analysis to identify anomalies. Conduct threat intelligence analysis to proactively address emerging threats. Develop and update SOC processes, playbooks, and incident response plans. Prepare reports and recommendations to improve the organization's security posture. Required Qualifications
7+ years of experience in a SOC environment. Active
TS/SCI security clearance . Demonstrated expertise in identifying, analyzing, and responding to security incidents using SIEM and threat intelligence platforms. Strong skills in containment, mitigation, and resolution of cybersecurity incidents. Deep understanding of network protocols, firewalls, and endpoint security solutions. Hands-on experience with system logs, packet captures, and forensic data analysis. Excellent documentation skills with the ability to communicate findings to technical and non-technical stakeholders. Experience with automation tools and scripting to streamline SOC operations. Knowledge of ITIL frameworks, incident management, and service desk processes. Preferred Skills
Experience managing complex incident response scenarios and threat hunts. Familiarity with advanced security automation and orchestration tools. Strong presentation and reporting skills for executive-level briefings.