IC-CAP, LLC
SOC Analyst 1 with Security Clearance
IC-CAP, LLC, Colorado Springs, Colorado, United States, 80509
SOC Analyst 1 102-176 with Security Clearance
The Security Operation Center (SOC) Analyst 1's primary function is to provide comprehensive Computer Network Defense and Response support through 24/7/365 monitoring and analysis of potential threat activity targeting the enterprise. This position will conduct security event monitoring, advanced analytics, and response activities in support of the government's mission. This position requires a solid understanding of cyber threats and information security in the domains of TTP's, Threat Actors, Campaigns, and Observables. Additionally, the candidate must be familiar with intrusion detection systems, intrusion analysis, security information event management platforms, endpoint threat detection tools, and security operations ticket management. The position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD), and Military Compartments efforts. The position will provide day-to-day support for Collateral, Sensitive Compartmented Information (SCI), and Special Access Program (SAP) activities. Performance shall include: Strong analytical and technical skills in computer network defense operations. Ability to lead efforts in Incident Handling (Detection, Analysis, Triage), Hunting (anomalous pattern detection and content management), and Malware Analysis. Experience in analyzing information technology security events to discern legitimate security incidents from non-incidents, including security event triage, incident investigation, implementing countermeasures, and conducting incident response. Knowledge and hands-on experience with Security Information and Event Monitoring (SIEM) platforms and/or log management systems that perform log collection, analysis, correlation, and alerting. Strong logical/critical thinking abilities, especially in analyzing security events (Windows event logs, network traffic, IDS events for malicious intent). Excellent organizational skills and attention to detail in tracking activities within various Security Operation workflows. A working knowledge of various operating systems (e.g., Windows, OS X, Linux) commonly deployed in enterprise networks, with a conceptual understanding of Windows Active Directory and network communications and routing protocols (e.g., TCP, UDP, ICMP, BGP, MPLS) and common internet applications and standards (e.g., SMTP, DNS, DHCP, SQL, HTTP, HTTPS). Experience with the identification and implementation of countermeasures or mitigating controls for deployment in the enterprise network environment. Experience with one or more of the following technologies: Network Threat Hunting, Big Data Analytics, Endpoint Threat Detection and Response, SIEM, workflow and ticketing, and Intrusion Detection System. Education and Experience:
Bachelor's degree with 24 years of related experience; prior performance in roles such as ISSO or ISSM;
DESIRED:
SAP Experience. Training:
IAT Level 1, CSSP Auditor, or CSSP Incident Responder (in lieu of Cybersecurity Service Provider Analyst). Security Clearance:
Active TS/SCI and the willingness to sit for a polygraph, if needed. IC-CAP provides equal employment opportunities (EEO) to all applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, or marital status. #J-18808-Ljbffr
The Security Operation Center (SOC) Analyst 1's primary function is to provide comprehensive Computer Network Defense and Response support through 24/7/365 monitoring and analysis of potential threat activity targeting the enterprise. This position will conduct security event monitoring, advanced analytics, and response activities in support of the government's mission. This position requires a solid understanding of cyber threats and information security in the domains of TTP's, Threat Actors, Campaigns, and Observables. Additionally, the candidate must be familiar with intrusion detection systems, intrusion analysis, security information event management platforms, endpoint threat detection tools, and security operations ticket management. The position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD), and Military Compartments efforts. The position will provide day-to-day support for Collateral, Sensitive Compartmented Information (SCI), and Special Access Program (SAP) activities. Performance shall include: Strong analytical and technical skills in computer network defense operations. Ability to lead efforts in Incident Handling (Detection, Analysis, Triage), Hunting (anomalous pattern detection and content management), and Malware Analysis. Experience in analyzing information technology security events to discern legitimate security incidents from non-incidents, including security event triage, incident investigation, implementing countermeasures, and conducting incident response. Knowledge and hands-on experience with Security Information and Event Monitoring (SIEM) platforms and/or log management systems that perform log collection, analysis, correlation, and alerting. Strong logical/critical thinking abilities, especially in analyzing security events (Windows event logs, network traffic, IDS events for malicious intent). Excellent organizational skills and attention to detail in tracking activities within various Security Operation workflows. A working knowledge of various operating systems (e.g., Windows, OS X, Linux) commonly deployed in enterprise networks, with a conceptual understanding of Windows Active Directory and network communications and routing protocols (e.g., TCP, UDP, ICMP, BGP, MPLS) and common internet applications and standards (e.g., SMTP, DNS, DHCP, SQL, HTTP, HTTPS). Experience with the identification and implementation of countermeasures or mitigating controls for deployment in the enterprise network environment. Experience with one or more of the following technologies: Network Threat Hunting, Big Data Analytics, Endpoint Threat Detection and Response, SIEM, workflow and ticketing, and Intrusion Detection System. Education and Experience:
Bachelor's degree with 24 years of related experience; prior performance in roles such as ISSO or ISSM;
DESIRED:
SAP Experience. Training:
IAT Level 1, CSSP Auditor, or CSSP Incident Responder (in lieu of Cybersecurity Service Provider Analyst). Security Clearance:
Active TS/SCI and the willingness to sit for a polygraph, if needed. IC-CAP provides equal employment opportunities (EEO) to all applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, or marital status. #J-18808-Ljbffr