Vacancy expired!
SOC Analyst - Remote
Position Description
CGI Federal is looking for Security Operations Analyst to support our Security Operations Center. We provide Incident Management and Intrusion Detection services as a Managed Security Service to both Federal and Commercial clients. Qualified applicants will be on the forefront of incident response where they will utilize the latest in network security technology to provide Computer Network Defense and Information Assurance (IA) support to CGI Federal and its customers.
This job allows for a remote worker!
Due to the nature of the government contracts this position requires US Citizenship
Your future duties and responsibilities
Your future duties and responsibilities
• Understand and maintain the appropriate knowledge of tools, security procedures, and services within the SOC.
• Ensure the proper direction, implementation, and understanding of new policies, programs, tools, and procedures are available within the team.
• Ensure the transfer of knowledge between analyst shifts and leadership to provide an understanding of all updates, assignments, training, and SOC procedures.
• Ensure the proper documentation and structure is in place to prioritize and escalate issues in order to be proactive rather than reactive.
• Provide analysts with consistent up-to-date documentation for clients and procedures in an easy-to-access and organized central location.
• Ensure that event analysis and incident reports are documented and quality control is applied to ensure accuracy.
• Assist in developing and maturing the future services and capabilities of the SOC, such as Forensics, Threat Management, Penetration Assessments, Tool Management, and more.
• Identify improvements within processes, procedures, policies, staffing, training, and tools to improve efforts and daily operations.
• Ensure that all procedures and operations are carried out by the responsible parties.
• Responsible for shift activity and daily operations in terms of making sure that the daily shift responsibilities are completed.
• Understand SOC objectives, direction, and procedures.
• Maintain the ability to complete all SOC daily operations and procedures, and ensure the proper escalation and leadership knowledge is provided.
• Ensure the proper documentation of tickets, shift documentation, correspondence, and escalations.
• Understand and maintain the appropriate knowledge of tools, security procedures, and services within the SOC.
• Ensure the proper direction, implementation, and understanding of new policies, programs, tools, and procedures are available within the team.
• Ensure the transfer of knowledge between analyst shifts and leadership to provide an understanding of all updates, assignments, training, and SOC procedures.
• Ensure the proper documentation and structure is in place to prioritize and escalate issues in order to be proactive rather than reactive.
• Provide analysts with consistent up-to-date documentation for clients and procedures in an easy-to-access and organized central location.
• Ensure that event analysis and incident reports are documented and quality control is applied to ensure accuracy.
• Assist in developing and maturing the future services and capabilities of the SOC, such as Forensics, Threat Management, Penetration Assessments, Tool Management, and more.
• Identify improvements within processes, procedures, policies, staffing, training, and tools to improve efforts and daily operations.
• Ensure that all procedures and operations are carried out by the responsible parties.
• Responsible for shift activity and daily operations in terms of making sure that the daily shift responsibilities are completed.
• Understand SOC objectives, direction, and procedures.
• Maintain the ability to complete all SOC daily operations and procedures, and ensure the proper escalation and leadership knowledge is provided.
• Ensure the proper documentation of tickets, shift documentation, correspondence, and escalations.
• Ensure events are handled at detection time according to established procedures.
• Demonstrate excellent communication and client care skills by documenting all activities within our client delivery systems and communicating with client representatives in a timely manner.
• Stay informed of current events in the security industry including the latest exploits and threats as well as preventative measures, remediation, and restoration techniques.
• Ensure that proper pass down is given in terms of the accuracy of the information and the events that took place during shift.
• Act as the escalation point for client requests for information and presence on conference calls where SOC representation is necessary.
• Mentor team members to improve quality and consistency of security information analysis of network traffic.
• Assist analyst investigation and ticket creation efforts. Provide daily monitoring and alerting of events that occur within the near real time environment.
• Ensure the proper mitigations and vulnerability management are recommended and escalated to management.
• Accurately and in detail, record pertinent information from the shift in the shift logs to ensure no information gaps occur at shift change.
Required qualifications to be successful in this role
Graduation with a degree from a recognized university with specialization in Computer Sciences or a related discipline and/or a minimum of three to five (3 - 5) years of directly related practical experience and demonstrated ability to carry out the functions of the job.
• Thirst for knowledge, inquisitive nature, keen interest in being a driver of the SOC expansion
• Experience working in an IT Security Operations Center using SANS methodology
• Experience designing IT security systems and/or experience in security penetration testing
• Experience and extensive knowledge of Security Information Event Management
• Experience in Intrusion Detection or Prevention Systems
• Knowledge of: TCP/IP, computer networking, routing and switching
• Experience in Linux/UNIX and Windows based devices at the System Administrator level
• System log forensics (Syslog, Event Viewer)
• Strong troubleshooting, reasoning and problem solving skills
• Team player, excellent communication skills, good time management
• Organizational skills and the ability to work autonomously with attention to processes
• Ability to speak and communicate effectively with peers, management and clients
• Ability and experience in writing clear and concise technical documentation
• Ability to speak and write fluently in English
• Security certifications: SANS/GIAC (GCIH, GCIA or GCUX), CEH, Sec+, & other similar certifications highly recommended.
DESIRED QUALIFICATIONS
SIEM experience (ArcSight, QRadar, Splunk)
• Experience using ticketing systems such as Remedy, LanDesk, ServiceNow
• Security +, Network +, CISSP, CEH, GCIA, GCIH, CISM, SPLUNK Training highly valued
• Knowledge of: Strong Authentication, End Point Security, Internet Policy Enforcement, Firewalls, Web Content Filtering, Database Activity Monitoring (DAM), Public Key Infrastructure (PKI), Data Loss Prevention (DLP), Identity and Access Management (IAM) solutions
• Knowledge of NIST, PCI, HIPAA
• Experience mentoring colleagues and willingness to be mentored
Est. Salary/Hourly Range (Colorado Only): $64,000 - 75,000
#CGIFederalJob