Northramp is looking for smart, creative individuals interested in helping grow something truly unique in our markets.
As a Tier 1 SOC Analyst you and the team will be responsible for manning a 24x7x365 coordination center and responding to alerts, notification, communications and providing incident response activities such as tracking the incident, communication with stakeholders, remediation and recovery actions and reporting. Ensure reports are properly entered into the incident tracking system. Expected to have basic knowledge of cybersecurity incidents, anomaly analysis, log analysis, digital forensics, common threat vectors and be able to comprehend reports and determine what additional action and response activities may be required to resolve an incident. The ideal candidate must have an understanding of Splunk SIEM and supporting forensic tools.
Please note: This is a hybrid role with a requirement to be on site at the client in Washington, DC at least 1-2 days per week.
We are currently looking for a Tier 1 SOC Analyst who has the following experience:
- Triaging events and investigating to identify security incidents
- Conducting incident handling (Detection, Analysis, Triage)
- Performing incident response analysis uncovering attack vectors involving a variety of malware, data exposure, and phishing and social engineering methods.
- Monitoring security events received through alerts from SIEM or other security tools
- Hunting (anomalous pattern detection and content management).
- Prior experience investigating security events; has the ability to distinguish incidents as opposed to non-incidents
- Logging security incidents in the IT ticketing system
- Managing security incidents throughout their lifecycle to closure
- Supporting ad-hoc data and investigation requests
- Participating in the remediation of incidents and responses that are generated from live threats against the enterprise
- Supporting and developing reports during and after incidents, which include all actions taken to properly mitigate, recover and return operations to normal operations
- IDS monitoring and analysis, analyze network traffic, log analysis, prioritize and differentiate between potential intrusion attempts and false alarms
- Understanding of enterprise networking (host-based firewalls, anti-malware, HIDS, IDS/IPS, proxy, WAF), Windows and Unix/Linux systems’ operations, TCP / IP protocols, experience providing analysis and trending of security log data
- General cyber-attack stages, profiling techniques and techniques for detecting host and network-based intrusions
- Composing security alert notifications
Required Qualifications:
- 2-3+ years of relevant SOC experience
- US Citizenship and must be able to pass background investigation
- Demonstrate proficiency in the Incident Response Process.
- Experience with Endpoint security solutions, Antivirus Solutions, EDR Tools
- Experience with the following toolsets: Splunk, Microsoft Defender for Endpoint, Proofpoint, FireEye, Stealthwatch
- Experience with the following log sources: Sysmon, Zeek, WinEvent Logs, DNS
- Strong analytical and technical skills in computer network defense
- Excellent organizational, verbal, presentation/facilitation, and written communication skills
- Very strong spoken and written communication and organizational skills
- Ability to concisely communicate events of a technical nature
Clearance
U.S. Citizenship required. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information.
COVID-19 Vaccine Mandate
Candidates must have received or be willing to receive the COVID-19 vaccination to be considered. Proof of vaccination is required. Medical and/or religious exemption requests will be considered. We will make a determination on your request for reasonable accommodation on a case-by-case basis.
About Northramp
At Northramp, our passion, our true north, is to help our clients cut through the fog and obtain technical and operational clarity to help them make the most significant impact possible. Focused like a laser on driving value for our clients, Northramp specializes in helping public and private sector clients streamline their IT operations, improve their technical services, and drive greater returns from IT investments.
If you are curious in learning more about Northramp, please visit our website at https://www.northramp.com.
All qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, or other legally protected status.
Reasonable Accommodation Requests
Northramp is committed to working with and providing reasonable accommodation to individuals with physical and mental disabilities. If you need special assistance or an accommodation while seeking employment, please call: 1-866-602-8688 - Northramp Human Resources. We will make a determination on your request for reasonable accommodation on a case-by-case basis.
EEO is the Law
The law requires Northramp to post a notice describing the Federal laws prohibiting job discrimination. For information regarding your legal rights and protections, please click on the following link: EEO is the Law and EEO is the Law Supplement.
Pay Transparency Non-Discrimination
Northramp will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay. Please see the Pay Transparency Nondiscrimination Provision for more information.
E-Verify
As a Federal Contractor, Northramp is required to participate in the E-Verify Program to confirm eligibility to work in the United States. For information please click on the following link: E-Verify.