Booz Allen Hamilton
Security Operations Center Analyst
Booz Allen Hamilton, Washington, District of Columbia, us, 20022
Job Number
R0231231
Title Security Operations Center Analyst
Opportunity Are you ready to take an active role in the cyber defense of network assets within the federal intelligence community (IC)? Are you looking for an opportunity to protect critical infrastructure from the constant onslaught of cyber attacks? If you want to sharpen your skills by analyzing real‑time threats, you want to be a cyber defense operations analyst.
Responsibilities As a Security Operations Center Analyst on our SOC team, you’ll monitor and analyze threats using state‑of‑the‑art tools such as Splunk, Trellix, HBSS, McAfee ePolicy Orchestrator, SolarWinds, Cisco FirePower, FireEye, ACAS, and more. You’ll work with the team to understand, mitigate, and respond to threats quickly, restoring operations and limiting the impact. You’ll analyze incidents to determine affected systems and assist recovery efforts. You’ll combine threat intelligence, event data, and assessments from recent events to identify patterns and understand attackers’ goals to stop them from succeeding.
What You’ll Work On
Provide security monitoring and incident response services in alignment with the mission to protect network assets, including industrial control systems.
Act as an internal expert on matters relating to intrusion detection and incident response.
Support investigations into network intrusions and other cybersecurity breaches.
Support a coordinated response to complex cyber attacks that threaten assets, intellectual property, and computer systems.
Contribute to the development and improvement of security monitoring and incident response processes and solutions to support our cybersecurity program.
Operate security monitoring and incident response toolsets with a focus on continuous improvement.
Research and recommend solutions for incident response and digital forensics.
You Have
5+ years of experience with information security, including penetration testing, intrusion detection, incident response, threat analysis, or digital forensics.
Experience with cybersecurity systems, tools, platforms, or applications, including Splunk, Trellis EDR, Cisco FirePower, FireEye, NX, EX, AX, McAfee ePolicy Orchestrator, or ACAS.
Knowledge of cybersecurity and IT architecture design and tools.
Ability to troubleshoot an active security event from detection to containment and provide recommendations.
Ability to work in an enterprise team setting.
Top Secret clearance.
Bachelor's degree.
DoD IAT Level II Certification.
Nice If You Have
TS/SCI clearance.
DoD IAM Level III or IAT Level III Certification.
Clearance Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Top Secret clearance is required.
Compensation Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work‑life programs, and dependent care. Salary for this position ranges from $69,400.00 to $158,000.00 annually (USD). The posting will close within 90 days from the posting date.
Identity Statement As part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud.
Work Model
If this position is listed as remote or hybrid, you’ll periodically work from a Booz Allen or client site facility.
If this position is listed as onsite, you’ll work with colleagues and clients in person, as needed.
Commitment to Non‑Discrimination All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.
Seniority Level
Not Applicable
Employment Type
Full‑time
Job Function
Information Technology
Industries
IT Services and IT Consulting
#J-18808-Ljbffr
Title Security Operations Center Analyst
Opportunity Are you ready to take an active role in the cyber defense of network assets within the federal intelligence community (IC)? Are you looking for an opportunity to protect critical infrastructure from the constant onslaught of cyber attacks? If you want to sharpen your skills by analyzing real‑time threats, you want to be a cyber defense operations analyst.
Responsibilities As a Security Operations Center Analyst on our SOC team, you’ll monitor and analyze threats using state‑of‑the‑art tools such as Splunk, Trellix, HBSS, McAfee ePolicy Orchestrator, SolarWinds, Cisco FirePower, FireEye, ACAS, and more. You’ll work with the team to understand, mitigate, and respond to threats quickly, restoring operations and limiting the impact. You’ll analyze incidents to determine affected systems and assist recovery efforts. You’ll combine threat intelligence, event data, and assessments from recent events to identify patterns and understand attackers’ goals to stop them from succeeding.
What You’ll Work On
Provide security monitoring and incident response services in alignment with the mission to protect network assets, including industrial control systems.
Act as an internal expert on matters relating to intrusion detection and incident response.
Support investigations into network intrusions and other cybersecurity breaches.
Support a coordinated response to complex cyber attacks that threaten assets, intellectual property, and computer systems.
Contribute to the development and improvement of security monitoring and incident response processes and solutions to support our cybersecurity program.
Operate security monitoring and incident response toolsets with a focus on continuous improvement.
Research and recommend solutions for incident response and digital forensics.
You Have
5+ years of experience with information security, including penetration testing, intrusion detection, incident response, threat analysis, or digital forensics.
Experience with cybersecurity systems, tools, platforms, or applications, including Splunk, Trellis EDR, Cisco FirePower, FireEye, NX, EX, AX, McAfee ePolicy Orchestrator, or ACAS.
Knowledge of cybersecurity and IT architecture design and tools.
Ability to troubleshoot an active security event from detection to containment and provide recommendations.
Ability to work in an enterprise team setting.
Top Secret clearance.
Bachelor's degree.
DoD IAT Level II Certification.
Nice If You Have
TS/SCI clearance.
DoD IAM Level III or IAT Level III Certification.
Clearance Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Top Secret clearance is required.
Compensation Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work‑life programs, and dependent care. Salary for this position ranges from $69,400.00 to $158,000.00 annually (USD). The posting will close within 90 days from the posting date.
Identity Statement As part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud.
Work Model
If this position is listed as remote or hybrid, you’ll periodically work from a Booz Allen or client site facility.
If this position is listed as onsite, you’ll work with colleagues and clients in person, as needed.
Commitment to Non‑Discrimination All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.
Seniority Level
Not Applicable
Employment Type
Full‑time
Job Function
Information Technology
Industries
IT Services and IT Consulting
#J-18808-Ljbffr