Job Details

ID #51064666
Estado Alabama
Ciudad Huntsville / decatur
Full-time
Salario USD TBD TBD
Fuente Deloitte
Showed 2024-02-15
Fecha 2024-02-15
Fecha tope 2024-04-15
Categoría Etcétera
Crear un currículum vítae
Aplica ya

SOC (Security Operations Center) Analyst in Huntsville, AL (Secret cleared)

Alabama, Huntsville / decatur, 35801 Huntsville / decatur USA
Aplica ya

Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS Cyber Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber minded culture and become stronger, faster, and more innovative. You will become part of a team that advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security. Our dynamic team offers opportunities to work with cutting-edge cyber security tools and grow both vertically and horizontally at an accelerated rate. Join our cyber team and elevate your career.This position is located in Huntsville, AL.Work you'll do

Responsible for analyzing technical solutions to help clients identify and evaluate security gaps in industrial control systems (ICS) and Operational Technology (OT), subsequently assisting in the implementation and projects from initiation to completion alongside the SOC Requirements Lead and SOC Manager

Assist in building the SOC and later provide analyst support once stood up.

Work closely with other workstreams to include OT SMEs, Infrastructure Team, Analytics Team, etc. to determine monitoring solutions, performance thresholds, visualization capabilities.

Work with Infrastructure Team and SIEM, SOAR, Workflow SMEs to analyze these solutions.

Creation and maintenance of metric reporting (KPI's/KRI) for senior management reporting

Actively review closed cases, open cases, and threat intelligence to make recommendations for preventative controls to reduce threats to an environment.

Actively participate in creating and providing updates to the standard operating procedures, playbooks, and other similar documentation for continuous improvement of security operations and efficiencies

Respond to OT/ICS security incidents and escalations by collecting and analyzing data, while gathering digital evidence to ensure incidents are handled within the scope of the playbooks and standard operating procedures.

Actively monitor multiple data points and SIEM to identify potential security issues for remediation, triage activities, and escalation to team lead and continued work with relevant case managers

Lead and generate end of shift reports/after action reports for documentation, knowledge transfer, and future contribution to playbooks and knowledge retention

The teamDeloitte's Government and Public Services (GPS) practice - our people, ideas, technology and outcomes-is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of more than 15,000 professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.At Deloitte, we believe cyber is about starting things-not stopping them-and enabling the freedom to create a more secure future. Cyber Strategy, Defense and Response (SDR) focuses on helping federal clients design and implement transformational enterprise security programs with an emphasis on defending against, recovering from, and mitigating major cyberattacks. If you're seeking a career that increases cyber awareness, utilizes risk management programs, and develops strategies for cyber defense and response, then the Cyber SDR offering at Deloitte is for you.QualificationsRequired:

Bachelor's degree and 2+ years of experience with workflow management, analytic capabilities, Security Information Event.

Active Secret Security clearance required.

Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.

Must have 8570 requirements required for the position category or specialty and level (i.e. CEH, CFR, CCNA Cyber Ops, CCNA-Security, CySA+, GCIA, GCIH, GICSP, Cloud+, SCYBER, PenTest+)

Experience with workflow management, analytic capabilities, Security Information Event Management (SIEM), SOC disciplines, and vulnerability tools (Splunk, ServiceNow, VirusTotal, RiskIQ

Understanding of Information Technology vs Operational Technology security challenges

Familiarity with malware and attack techniques

Interest or working knowledge of Operational Technology/Industrial Control System (OT/ICS)

Ability to recognize potential, successful, and unsuccessful attempts to exfiltrate data/intrusion attempts and compromises through reviews of available logging and relevant event detail and summary information

Preferred:

Prior professional services or federal consulting experience

Advanced knowledge in incident response, vulnerability management, analytics, reconnaissance, security intelligence, automation/scripting experience or know how to troubleshoot existing scripts with little guidance

Experience in mentorship, training, and guiding junior members of a SOC team.

Experience in standing up a SOC and building out procedures for SOC day to day work

Ability to handle multiple competing priorities in a fast-paced and high-pressure environment

Excellent communication and writing skills, detail oriented, and ability to work as an individual contributor and with a team

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.

Aplica ya Suscribir Reportar trabajo