Tier One Technologies is seeking a SOC Analyst to work on a Contract-to-Hire position with our direct US Government client.
This on-site position will be located Indianapolis, IN.
SELECTED CANDIDATES WITHOUT REQUIRED CLEARANCE WILL BE SUBJECT TO A FEDERAL GOVERNMENT BACKGROUND INVESTIGATION TO RECEIVE IT.
Must be a US citizen.
Must hold active Secret clearance.
Responsibilities
Serve as a Cybersecurity service provider analyst at the clientβs site.
Assist with monitoring, analyzing, detecting, and responding to Cyber events and incidents under supervision.
Assist with supporting dynamic Cyber defense and delivering operational effects, including intrusion detection and prevention and situational awareness.
Create, tune, and compile metrics of all security devices and documentation of processes and procedures. Identify security issues and risks and then develop mitigation plans.
Work in a 24/7 security operations center (SOC) environment at an Indianapolis client facility, including maintaining direct contact with client management to provide analysis and trending of security log data from various security devices.
Ability to work a 12AM -12PM or 12PM β 12AM shift, including some weekends.
Qualifications
3+ years of experience with incident handling, forensics, sensor alert tracking, or Cybersecurity case management.
1+ years of experience in a SOC.
CERTIFICATIONS: DoD 8570 Baseline Certification CSSP Analyst (One or more required):
Must be a US Citizen and have active Secret clearance.
Experience with Cybersecurity tools, including ArcSight, ACAS, or equivalent SIEM tools.
Experience with Cybersecurity forensics tools and methodologies.
Experience with network ports, protocols, log review and analysis.
Ability to apply NIST, federal, and DoD guidelines, policies, directives, and memos as they relate to Cybersecurity.
Ability to provide monitoring and risk analysis of zero-day and other vulnerabilities.
Knowledge of industry, government and DoD best practices, including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors.
Knowledge of DoD system solutions to mitigate risk in any activity that potentially impacts the security of existing IT and information management.
Must not have traveled outside the US for a combined total of 6 months or more in the last 5 years.