1+ months

Federal - Tier 2 SOC Analyst

Greenbelt, MD 20768


Organization: Accenture Federal Services


Location: Greenbelt, MD





Accenture Federal Services, a wholly owned subsidiary of Accenture LLP, is a U.S. company with offices in Arlington, Virginia. Accenture's federal business has served every cabinet-level department and 30 of the largest federal organizations. Accenture Federal Services transforms bold ideas into breakthrough outcomes for clients at defense, intelligence, public safety, civilian and military health organizations.





We believe that great outcomes are everything. Its what drives us to turn bold ideas into breakthrough solutions. By combining digital technologies with what works across the worlds leading businesses, we use agile approaches to help clients solve their toughest problems fastthe first time. So you can deliver what matters most.





Count on us to help you embrace new ways of working, building for change and put customers at the core. A wholly owned subsidiary of Accenture, we bring over 30 years of experience serving the federal government, including every cabinet-level department. Our 7,200 dedicated colleagues and change makers work with our clients at the heart of the nations priorities in defense, intel, public safety, health and civilian to help you make a difference for the people you employ, serve and protect.






The Tier
2 Cyber SOC Analyst will conduct network analysis of targets,
operate daily open source research (OSR) missions, resulting in various reports
and alerts, and possesses extensive knowledge on network, endpoint, threat
intelligence, as well as the functioning of specific applications or underlying
IT infrastructure, and has some experience with forensics tools, malware
analysis, closely involved in developing, tuning and implementing threat
detection analytics. They will also be responsible for the following:





Work
with alerts from the Tier 1 SOC Analysts, to perform in-depth analysis and
triage of network security threat activity based on computer and media
forensics, malicious code analysis, and protocol analysis


Assist
with the development of incident response plans, workflows, and SOPs


Deploy
and maintain security sensors and tools


Monitor
security sensors and review logs to identify intrusions


Work
directly with cyber threat intelligence analysts to convert intelligence into
useful detection


Collaborate
with the incident response team to rapidly build detection rules and signatures
as needed


Identify
incident root cause and take proactive mitigation steps


Review
vulnerabilities and track resolution


Review
and process threat intel reports and sources


Develop
and implement detection use cases


Develop
and implement IDS signatures


Assist
with incident response efforts


Create
and brief customer reports


Participate
in on-call rotation for after-hours security and/or engineering issues


Perform
customer security assessments


Develop
and run table top exercises








Required Qualifications:


Bachelors Degree or 4 additional years of experience


10 years of total IT or related experience


4 years of experience working in a Security Operations Center/SOC environment as a Tier 1 or 2 analyst or equivalent














Preferred
Qualifications:




2
year or more of Splunk or related SIEM user experience including creating
reports, running queries, defining correlation searches





At least one security certification such as GCIA, GCIH, CEH





Understanding of root causes of malware infections and proactive
mitigation




Understanding
of lateral movement and footholds




Understanding
of data exfiltration techniques. Experience with critical thinking,
problem-solving, and analytic concepts.




Real
world experience analyzing complex attacks and understand TTPs of threat actors




Define
relationships between seemingly unrelated events through deductive reasoning




Experience
in network/host-based intrusion analysis, malware analysis, forensics, and
cyber threat intel




Knowledge
of advanced threat actors and complex attacks




Practiced knowledge of network routing and switching fundamentals
to include knowledge of Multiprotocol Layer Switching (MPLS)




Good
technical understanding of operating systems, network architecture and design,
Active Directory (AD) application log consumables, systems design as well as
superior knowledge of technical operations process and procedures




Knowledge
of encryption, key management and cryptology




Familiarity
with the Risk Management Framework (NIST 800-37), Security Controls as
described in NIST 800- 35, and the Federal Information Security Modernization
Act (FISMA) operating standards and applicable guidelines




Experience
with performing threat modeling, risk analysis, root cause analysis, risk
identification, and risk mitigation




Experience
planning and implementing secure networking practices such as: application
segmentation, network segmentation, NAC and other access control
testing/validation, updating access control SOPs




Ability
to configure and develop an enterprise SIEM solution including signature
tuning, development of correlation rules, reports, and alarms




Familiarity
with a variety of web application protocols, web services (components including
JavaScript, XML, JSON), scripting capabilities (Power shell, Python) software
development frameworks, operating systems, and networking technologies.
Understanding of various web application frameworks such as ASP.NET, J2EE







An active security clearance or the ability to obtain one may be required for this role.









Candidates who are currently employed by a client of Accenture or an affiliated Accenture business may not be eligible for consideration.









Applicants for employment in the U.S. must possess work authorization which does not require now or in the future sponsorship by the employer for a visa.




Accenture is a federal contractor, an EEO and Affirmative Action Employer of Females/Minorities/Veterans/Individuals with Disabilities.









Equal Employment Opportunity




All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law.









Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process.









Accenture is committed to providing veteran employment opportunities to our service men and women.


Categories

Posted: 2019-10-04 Expires: 2019-11-17

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Federal - Tier 2 SOC Analyst

Accenture
Greenbelt, MD 20768

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast