Minimum of 2 years in information security, Bachelor's degree or equivalent certification, Experience with log analysis tools, Ability to build SIEM content, Knowledge of cybersecurity frameworks.
Key responsabilities:
Monitor SIEM and on-premises/cloud applications for threats.
Respond to critical incidents and execute recovery activities.
Assess lessons learned during post-incident reviews.
Coordinate with engineering to improve alert fidelity.
Perform threat hunting and compile reports for SOC leadership.
Report This Job
Help us maintain the quality of our job listings. If you find any issues with this job post, please let us know.
Select the reason you're reporting this job:
How can organizations navigate today's increasingly complex landscape of cyber threats? How can they unlock the power of cloud, data and AI, and always-on cybersecurity to meet the mission?
These are the questions that drive us at ECS.
A segment of ASGN (NYSE: ASGN) headquartered in Fairfax, Virginia, ECS delivers advanced technology, science, and digital transformation solutions that solve critical challenges for customers in the U.S. public and private sectors. ECS maintains premier partnerships with leading cloud, cybersecurity, and AI/ML providers and holds specialized certifications in their technologies.
The secret to our success? Our people: a staff of 3,800+ hard-working, bright, resilient, curious, and collaborative professionals. We believe in bringing our best selves to the table, and our values -- grit, excellence, drive, and community -- define our culture.
Recognized as a Top Workplace by The Washington Post six times, ECS is ready to help you maximize your potential, put your expertise to work, and grow along the way! Learn more about us at www.ECStech.com.
ECS is seeking a SOC Mid-Level Analyst to work in our Remote office .
Job Description:
ECS is seeking a Mid-Level SOC Analyst with demonstrated experience supporting the development of processes, procedures, and automations to rapidly ingest, aggregate, correlate, normalize, and analyze event messages to rapidly and assuredly identify and respond to Indicators of Compromise (IoC). The ideal candidate is a critical thinker and perpetual learner who is excited to solve some of our clients’ toughest challenges. To be successful the candidate must have experience working in a mature 24x7x365 Security Operation Center.
Responsibilities include:
Continuously monitors SIEM and on-premises infrastructure/cloud applications for security events to threats & intrusions, including:
SIEM alert queue
Phishing email inbox
Intel feeds via email and other sources (i.e., US-CERT, MS-ISAC)
Incident ticketing queue
Participates with responding to and handling all critical incident activity. Ensure the execution of proper containment, remediation, and recovery activities.
Assesses and documents lessons learned as part of post-incident review, such as unsuccessful controls, outdated procedures, or incomplete remediation actions.
Coordinates with SIEM engineering to tune security events and alerts for improving alert fidelity.
Assists with creating and tuning Security Orchestration and Automation (SOAR) playbooks and automated workflows.
Performs proactive threat hunting to identify and characterize new emerging threats, vulnerabilities, and risks.
Works closely with Cyber Threat Intel to provide information on detection patterns for new upcoming threats
Compiles threat hunt reports as requested on any specific hunt/threat inquiry and disseminate to SOC leadership.
Conducts research and document events of interest within the scope of Cyber Security.
Salary Range: $90,000-$135,000
General Description Of Benefits
Required Skills:
Minimum of 2 years experience conducting analysis of log data in support of intrusion analysis or information security operations.
Bachelors degree or equivalent with relevant certifications.
Experience with two or more analysis tools used in a CIRT or similar investigative environment.
Ability to build content in SIEM system.
Ability to analyze and triage IoCs.
Desired Skills:
Strong analytical mindset with an open and engaging personality
Knowledge of the Cybersecurity Framework (CSF) and MITRE ATT&CK Framework
Preferred Certifications (one or more):
Certified Ethical Hacker (CEH)
Certified Information System Security Professional (CISSP)
Certified Information Systems Auditor (CISA)
CompTIA Security+
Computer Hacking Forensic Investigator (CHFI)
ECS is an equal opportunity employer and does not discriminate or allow discrimination on the basis of race, color, religion, sex, age, sexual orientation, gender identity or expression, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, status as a crime victim, disability, protected veteran status, or any other characteristic protected by law. ECS promotes affirmative action for minorities, women, disabled persons, and veterans.
ECS is a leading mid-sized provider of technology services to the United States Federal Government. We are focused on people, values and purpose. Every day, our 3800+ employees focus on providing their technical talent to support the Federal Agencies and Departments of the US Government to serve, protect and defend the American People.
Required profile
Experience
Level of experience:Mid-level (2-5 years)
Industry :
Information Technology & Services
Spoken language(s):
English
Check out the description to know which languages are mandatory.