General Dynamics - Colorado Springs, CO

posted 4 months ago

Full-time - Mid Level
Colorado Springs, CO
10,001+ employees
Transportation Equipment Manufacturing

About the position

The Security Operation Center (SOC) Analyst Lead plays a critical role in the cybersecurity landscape, particularly within the Department of Defense (DoD). This position is primarily responsible for leading a team that develops, implements, and evaluates the SOC's capabilities to provide comprehensive Computer Network Defense and Response support. The SOC operates 24/7/365, monitoring and analyzing potential threat activities targeting the enterprise. The Lead SOC Analyst will oversee the monitoring of the organization's network and devices for security breaches, ensuring that the team maintains effective software tools such as log management systems, while also researching the latest security trends. This role involves conducting security assessments and compliance reviews of SOC operations, as well as assisting with the maintenance of Security Policy and Procedures and training all SOC personnel. The ideal candidate will possess a solid understanding of cyber threats and information security, particularly in the domains of tactics, techniques, and procedures (TTPs), threat actors, campaigns, and observables. Familiarity with intrusion detection systems, security information event management platforms, endpoint threat detection tools, and security operations ticket management is essential. The SOC Analyst Lead will support activities within Special Access Programs (SAPs) for various DoD agencies, including HQ Air Force and the Office of the Secretary of Defense (OSD). This position will provide day-to-day support for Collateral, Sensitive Compartmented Information (SCI), and SAP activities, ensuring that the SOC operates effectively and efficiently. Performance expectations for this role include strong analytical and technical skills in computer network defense operations, the ability to lead incident handling efforts, and expertise in malware analysis. The Lead Analyst will be responsible for analyzing IT security events to differentiate between legitimate security incidents and non-incidents, implementing countermeasures, and conducting incident response. The candidate must have extensive hands-on experience with Security Information and Event Monitoring (SIEM) platforms and log management systems, as well as a strong understanding of various operating systems and network communications protocols. Additionally, the Lead Analyst will prepare and maintain security documentation, develop SOC processes and procedures, and communicate business risks associated with cybersecurity issues effectively.

Responsibilities

  • Lead the SOC team in developing, implementing, and evaluating Computer Network Defense and Response support.
  • Monitor the organization's network and devices for security breaches.
  • Maintain software tools such as log management systems and conduct security assessments.
  • Research the latest security trends and assist with Security Policy and Procedure maintenance.
  • Train all SOC personnel on security protocols and procedures.
  • Analyze information technology security events to discern legitimate security incidents.
  • Implement countermeasures and conduct incident response activities.
  • Support the design, implementation, operation, and maintenance of security applications and tools.
  • Prepare, validate, and maintain security documentation including incident response plans and risk assessments.
  • Develop and implement SOC processes and procedures.

Requirements

  • 8-10 years of related experience in cybersecurity or a similar field.
  • Prior experience in roles such as ISSO, ISSM, or SOC analyst.
  • 2+ years of experience with Special Access Programs (SAP).
  • Bachelor's degree in a related area or equivalent experience (4 years).
  • Certifications such as IAT Level 3, IAM Level 3, CND Auditor, or Incident Responder within 6 months of hire.

Nice-to-haves

  • Experience with Network Threat Hunting and Big Data Analytics.
  • Knowledge of cloud technology and content filtering/firewall technology.
  • Experience in analyzing NetFlow data and packet capture (PCAP).
  • Familiarity with common attack methodologies and emerging threats.

Benefits

  • Competitive salary range of $129,370 - $175,030 based on experience and location.
  • Comprehensive health insurance coverage.
  • 401k retirement savings plan with matching contributions.
  • Paid time off and holidays.
  • Opportunities for continued education and professional development.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service