Security Operations Center (SOC) Analyst

Apply now »

Date: Jun 11, 2024

Location: Sterling, VA, US

Company: NTT DATA Services

Req ID: 284438 

NTT DATA Services strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now.

We are currently seeking a Security Operations Center (SOC) Analyst to join our team in Sterling, Virginia (US-VA), United States (US).

Job Description:

The Information Security Senior Analyst is responsible for designing and implementing solutions for protecting the confidentiality, integrity, and availability of sensitive information.

This is a Security Operation Center position. This position primarily focuses on cybersecurity incident detection and response. Other primary areas of focus would be:  zero-day events, utilizing cybersecurity tools to conduct investigations and analysis of events, utilizing the seven steps of the Incident Response process.

 

All of the duties listed support one or more of the following cybersecurity related functions; information security, SA&A, incident response, cyber security, insider threat, computer forensics, vulnerability assessment and management, network data capture, intrusion detection, log management, auditing, security incident and event management (SIEM), and penetration testing.

 

Personnel assigned to this role will serve primarily on the Operations & Response (O&R) Team; this role may also support the Vulnerability Assessment and Penetration Test (VAPT) and Engineering teams. This position is also responsible for coordinating with both the Cybersecurity Services Section and other sections or divisions within the client’s organization. These may include, but are not limited to, IT Operations, Engineering & Integration, Software Operations, and the Office of Investigative Technology.

 

Job Duties:

  • Performs network security monitoring and incident response for a large organization.
  • Coordinates with other government agencies to record and report incidents.
  • Maintains records of security monitoring and incident response activities, utilizing case management and ticketing technologies.
  • Monitors Security Information and Event Management (SIEM) to identify security issues for remediation.
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications, and operating systems.
  • Assists with implementation of countermeasures or mitigating controls.
  • Supports efforts to consolidate and conduct comprehensive analysis of threat data obtained from classified, proprietary, and open-source resources to provide indication and warnings of impending attacks against unclassified and classified networks.
  • Supports Team Lead on developing recommendations for changes to Standard Operating Procedures and other similar documentation.
  • Monitors and reviews logs from existing security tools and creates new security tool signatures to ensure maximum performance and availability.
  • Performs all aspects of intrusion detection, log and audit management, network and database vulnerability assessment and compliance management, and security configuration.
  • Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability. Also manages accounts, security devices, and patches; responsible for access control/passwords/account creation and administration.
  • Analyze collected information to identify vulnerabilities and potential for exploitation.
  • Provides support in the identification, documentation, and development of computer and network security countermeasures.
  • Identifies network and operating systems vulnerabilities and recommends countermeasures.
  • Supports the deployment and integration of security tools as needed.
  • Prepares written reports and provides verbal information security briefings.
  • Investigates, monitors, analyzes, and reports on information security incidents.
  • Responds to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats.
  • Use mitigation, preparedness, and response and recovery approaches, as needed to maximize information security.
  • Provides incident handling support for incident detection, analysis, coordination, and response.
  • Monitors network to actively remediate unauthorized activities.
  • Monitors intrusion detection sensors and log collection hardware and software to ensure systems are collecting relevant data.
  • Monitors all security systems to ensure maximum performance and availability.
  • Analyze computer security threat information from multiple sources, disciplines, and agencies across.

 

Basic Qualifications:

  • BS/BA in Computer Science, Information Systems, Engineering, Business, Physical Science, or other technology-related discipline.
    • Education Equivalency: H.S. Diploma + 4 years additional experience equals Associate’s Degree; Associate’s Degree + 4 years additional experience equals Bachelor’s Degree.
  • Minimum 3 years of experience performing any combination of Information System Security, Security Assessment & Authorization, Cybersecurity, Computer Forensics, or Insider Threat.
  • Secret clearance required, must be eligible for a Top-Secret clearance, if requested.

 

Preferred Qualifications:

  • CompTIA CySA+ cybersecurity analyst certification.
  • Cybersecurity Incident response and Detection experience.
  • Experience in cybersecurity event triaging. Utilizing the seven steps of the Incident Response Process – (IRP).
  • Security Operation Center Experience – (SOC).
  • Conducting cyber event investigations to determine root cause of the event. Determining if the event is a True/False Positive.
  • Creating rules, thresholds, and policies associated with cybersecurity tool platforms designed to prevent Indicators of Compromise/Attack from occurring. IOC’s/IOA’s.
  • Verification & Validation of information, containment, eradication, and recovery from incidents.
  • Experience in validating Hash’s Malicious IP’s, URL’s.
  • Experience in investigating malicious emails and payloads.
  • Requirements analysis, program development activities, architecture, engineering, integrating, developing and/or deploying information technology products (hardware and software) in an enterprise environment.
  • Ability to create and monitor multiple cybersecurity tools dashboards.
  • Experience in Open-Source Intelligence gathering.
  • Experience with Threat hunting and vulnerability assessment.
  • Knowledge of SIEM tools and query generation.

 

#FEDSEC

 

About NTT DATA Services

NTT DATA Services is a recognized leader in IT and business services, including cloud, data and applications, headquartered in Texas. As part of NTT DATA, a $30 billion trusted global innovator with a combined global reach of over 80 countries, we help clients transform through business and technology consulting, industry and digital solutions, applications development and management, managed edge-to-cloud infrastructure services, BPO, systems integration and global data centers. We are committed to our clients’ long-term success. Visit nttdata.com or LinkedIn to learn more.

NTT DATA Services is an equal opportunity employer and considers all applicants without regarding to race, color, religion, citizenship, national origin, ancestry, age, sex, sexual orientation, gender identity, genetic information, physical or mental disability, veteran or marital status, or any other characteristic protected by law. We are committed to creating a diverse and inclusive environment for all employees. If you need assistance or an accommodation due to a disability, please inform your recruiter so that we may connect you with the appropriate team.


Nearest Major Market: Washington DC

Job Segment: Cloud, Testing, Open Source, Computer Science, Information Security, Technology

Apply now »