Information Security Advisor
Apply now »Date: Apr 28, 2026
Location: Merrifield, VA, US
Company: NTT DATA Services
Req ID: 365384
NTT DATA strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now.
We are currently seeking a Information Security Advisor to join our team in Merrifield, Virginia (US-VA), United States (US).
Job Summary:
The Senior SOC Analyst is a key member of the 24/7/365 Security Operations Center, which serves as the escalation point for advanced investigations, incident response, and proactive threat hunting. This role conducts higher-level analysis than other analysts on the team. A senior SOC analyst performs deep forensic investigations, correlates multi-source threat intelligence information, and guides containment and remediation strategies. The Senior SOC Analyst identifies and mitigates advanced threats across enterprise IT endpoints, cloud environments, and OT systems. They leverage frameworks like the MITRE ATT&CK framework and others to detect, disrupt, and prevent malicious activity from occurring in the enterprise environment. They work closely with the SOC manager and leads. They mentor junior staff, assist to refine SOC processes, and ensures the organization maintains a strong cybersecurity posture. They collaborate with engineers, threat intelligence and forensics teams to enhance detection capabilities, improve incident response readiness, and deliver actionable security insights to leadership.
Job Duties:
1. Lead advanced incident detection, investigation, and analysis efforts.
a. Correlate SIEM, EDR, IDS/IPS, and firewall data to identify and analyze potential incidents.
b. Perform deep-dive investigations to determine root cause, scope, and impact of incidents.
c. Apply MITRE ATT&CK and other frameworks for adversary TTP identification.
d. Conduct kill-chain and supply chain analysis to understand and counter threats.
2. Coordinate and direct complex incident response activities.
a. Guide preparation, identification, containment, eradication, and recovery actions in collaboration with SOC, forensics, and engineering teams.
b. Serve as the primary escalation point for high-impact or advanced incidents.
c. Ensure incident handling aligns with established guidelines, response plans, and playbooks.
3. Conduct proactive threat hunting to identify emerging risks.
a. Analyze telemetry, logs, and behavioral patterns for indicators of compromise or attack.
b. Hunt for advanced persistent threats and undiscovered vulnerabilities.
c. Use advanced queries in SOC cybersecurity tools to detect anomalous or suspicious activity.
4. Work with forensic teams to ensure proper forensic collection, preservation, and analysis of digital evidence.
a. Coordinate with forensics teams to ensure chain-of-custody and evidence integrity.
b. Extract and analyze relevant artifacts to support investigations and post-incident reviews.
c. Document and communicate forensic findings to stakeholders.
5. Develop and enhance SOC processes, playbooks, and detection capabilities.
a. Refine detection rules, alert thresholds, and automation workflows in SIEM/SOAR platforms and other cybersecurity tools.
b. Create SOPs, knowledge base articles, and training materials for SOC staff.
c. Recommend and guide implementation of new detection and analysis tools.
6. Perform threat intelligence collection, analysis, and dissemination.
a. Gather threat data from internal, classified, and open-source intelligence feeds.
b. Analyze and contextualize intelligence to produce actionable recommendations.
c. Share relevant threat information with SOC, leadership, and partner teams.
7. Mentor and train SOC analysts to improve investigative capabilities and analytical thought process.
a. Provide real-time guidance during active incidents.
b. Conduct regular training sessions, tabletop exercises, and red/blue team drills.
c. Validate analyst findings and provide feedback to designed to provoke thought, improve accuracy, and investigative thoroughness.
8. Collaborate with stakeholders to strengthen overall cybersecurity posture.
a. Work with engineering, IT, and cloud teams to address identified vulnerabilities.
b. Participate in tool evaluations, recommending solutions that enhance SOC capabilities and identify capability overlap.
c. Support internal coordination with DEA sections, divisions, and external entities.
9. Maintain documentation and reporting for SOC operations.
a. Record investigative steps, evidence, and incident timelines in case management systems.
b. Generate incident reports, trend analyses, and post-mortem summaries.
c. Provide executive-level briefings on security events and SOC performance.
Basic Qualifications:
- Master’s degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science.
-
- Education Equivalency: One-and-one- half (1.5) years of additional experience can substitute for one (1) year of a typical degree program.
- Minimum 8 years of experience in Information Technology (IT) and/or Information Security (IS).
- DoD 8140 certification for their respective area or the ability to obtain certification within six (6) months of onboarding.
- Active Secret or higher security clearance holder and must be eligible for a Top-Secret clearance if requested.
About NTT DATA
NTT DATA is a $30 billion business and technology services leader, serving 75% of the Fortune Global 100. We are committed to accelerating client success and positively impacting society through responsible innovation. We are one of the world's leading AI and digital infrastructure providers, with unmatched capabilities in enterprise-scale AI, cloud, security, connectivity, data centers and application services. our consulting and Industry solutions help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have experts in more than 50 countries. We also offer clients access to a robust ecosystem of innovation centers as well as established and start-up partners. NTT DATA is a part of NTT Group, which invests over $3 billion each year in R&D.
Whenever possible, we hire locally to NTT DATA offices or client sites. This ensures we can provide timely and effective support tailored to each client’s needs. While many positions offer remote or hybrid work options, these arrangements are subject to change based on client requirements. For employees near an NTT DATA office or client site, in-office attendance may be required for meetings or events, depending on business needs. At NTT DATA, we are committed to staying flexible and meeting the evolving needs of both our clients and employees. NTT DATA recruiters will never ask for payment or banking information and will only use @nttdata.com, @nttdatafed.com and @talent.nttdataservices.com email addresses. If you are requested to provide payment or disclose banking information, please submit a contact us form, https://us.nttdata.com/en/contact-us.
NTT DATA endeavors to make https://us.nttdata.com accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact us at https://us.nttdata.com/en/contact-us. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications. NTT DATA is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. For our EEO Policy Statement, please click here. If you'd like more information on your EEO rights under the law, please click here. For Pay Transparency information, please click here.
Nearest Major Market: Washington DC
Job Segment:
Information Security, Computer Science, Open Source, Consulting, Information Systems, Technology