Tier III Security Operations Center Analyst

T-Rex Corporation • Greenbelt, MD 20770

Posted 1 week ago

Job Description

Program Overview

T-Rex Solutions is a leading business combining innovative Next Generation IT ("NGIT") capabilities and enabling skills to provide industry-leading solutions to the federal government. T-Rex has a prime position on one of the largest and most technologically advanced cloud, cybersecurity, and big data implementation projects within the federal contracting space, 2020 Census Technical Integrator. This $1B+ contract encompasses integrating dozens of mission critical applications operating in a public AWS GovCloud that is managed with a hyper-converged datacenter and is protected by a world class active cyber defense solution. T-Rex's program is the first and largest of its kind within federal agencies, as its focus on cloud integration and next generation solutions, will potentially generate $2 billion in cost savings for Census and sets the precedent for future government technology modernization projects.

What you'll do:

The Security Operations Center Analyst will possess in-depth knowledge on network, endpoint, threat intelligence, forensics and malware reverse engineering, as well as the functioning of specific applications or underlying IT infrastructure; acts as an incident "hunter," not waiting for escalated incidents; closely involved in developing, tuning and implementing threat detection analytics.

* Assist with the development of incident response plans, workflows, and SOPs

* Deploy and maintain security sensors and tools

* Monitor security sensors and review logs to identify intrusions

* Using a high-level scripting/programming language to extract, de-obfuscate, or otherwise manipulate malware related data

* Think critically and creatively while analyzing security events, network traffic, and logs to engineer new detection methods

* Work directly with cyber threat intelligence analysts to convert intelligence into useful detection

* Collaborate with incident response team to rapidly build detection rules as needed

* Identify incident root cause and take proactive mitigation steps

* Perform lessons learned activities

* Mentor junior analysts and run brown bag training sessions

* Review vulnerabilities and track resolution

* Review and process threat intel reports

* Develop and implement detection use cases

* Develop and implement IDS signatures

* Assist with incident response efforts

* Create and brief customer reports

* Participate in on-call rotation for after-hours security and/or engineering issues

* Perform customer security assessments

* Develop and run table top exercises

What you'll bring:

* Bachelor's Degree in a relevant major from an accredited college or university with 14+ years of continuous and progressive experience

* Required Certifications: 1 of the following: CERT Certified Computer Security Incident Handler, Electronic Commerce Council Certified Ethical Hacker (ECC), GIAC Information Security Fundamentals (GISF), ISC2 Certified Information System Security Professional (CISSP)

* Fuse locally derived and externally sourced cyber threat intelligence into signatures, detection techniques, and analytics intended to detect and track the advanced threat

* Strong understanding of root causes of malware infections and proactive mitigation

* Strong understanding of lateral movement and footholds

* Strong understanding of data exfiltration techniques. Demonstrated ability in critical thinking, problem solving, and analytics

* Enjoy analyzing patterns looking for outliers

* Enjoy creating ways to find needles in haystacks

* Have real world experience analyzing complex attacks and understand TTPs of threat actors

* Define relationships between seemingly unrelated events through deductive reasoning

* Experience in network/host based intrusion analysis, malware analysis, forensics, and cyber threat intel

* Knowledge of advanced threat actors and complex attacks

* Possess excellent writing skills and the ability to communicate to technical and executive level staff

* Quick study with new tools

* Knowledge of Splunk

* Expert knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS)

* Deep technical understanding of operating systems, network architecture and design, Active Directory (AD) application log consumables, systems design as well as superior knowledge of technical operations process and procedures

* Knowledge of encryption, key management and cryptology

* Familiarity with the Risk Management Framework (NIST 800-37), Security Controls as described in NIST 800-35, and the Federal Information Security Modernization Act (FISMA) operating standards and applicable guidelines

* Experience with performing threat modelling, risk analysis, root cause analysis, risk identification, and risk mitigation

* Experience planning and implementing secure networking practices such as: application segmentation, network segmentation, NAC and other access control testing/validation, updating access control SOPs

* Ability to configure and develop an enterprise SIEM solution including signature tuning, development of correlation rules, reports, and alarms

* Familiarity with a variety of web application protocols, web services (components including JavaScript, XML, JSON), scripting capabilities (Power shell, Python) software development frameworks, operating systems, and networking technologies. Understanding of various web application frameworks such as ASP.NET, J2EE

Gets you Bonus Points:

* Preferred Certifications: SANS SEC503: Intrusion Detection In-Depth; SANS SEC504: Hacker Tools, Techniques, Exploits and Incident Handling; SANS SEC561: Intense Hands-on Pen Testing Skill Development; SANS FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques; CCNA Cyber Ops; DoD certs; Offensive Security Certified Professional (OSCP); Offensive Security Exploitation Expert (OSEE); Certified Expert Penetration Tester (CEPT); Certified Reverse Engineering Analyst (CREA); Certified Computer Forensics Examiner (CCFE); Training on anomaly detection; tool-specific training for data aggregation and analysis and threat intelligence; Splunk Certified User or Power User; Splunk Certified Admin

T-Rex Overview

Established in 1999, T-Rex Solutions, LLC is a proven mid-tier business providing data-centric mission services to the Federal government as it increasingly tries to secure and leverage the power of data. We design, integrate, secure, and deploy advanced technical solutions for our customers so they can efficiently fulfill their critical objectives. T-Rex offers both IT and professional services to numerous Federal agencies and is a leader in providing high quality and innovative solutions in the areas of Cloud and Infrastructure Services, Cyber Security, and Big Data Engineering.

T-Rex is constantly seeking qualified people to join our growing team. We have built a broad client base through our devotion to delivering quality products and customer service, and to do that we need quality individuals. But more than that, we at T-Rex are committed to creating a culture that supports the development of every employee's personal and professional lives. T-Rex has made a commitment to maintain the status of an industry leader in compensation packages and benefits which includes competitive salaries, performance bonuses, training an

×

Sign Up for Daily Job Alerts.

Thank You

You will receive your first job alert within 24 hours.

Similar Jobs

    Browse Jobs | Terms & Conditions | Privacy Policy | Unsubscribe
    POWERED BY    

    POWERED BY