Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
SOC Analyst II image - Rise Careers
Job details

SOC Analyst II

At Agile Defense we know that action defines the outcome and new challenges require new solutions. That's why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests.Requisition: 626Job Title: SOC Analyst IILocation: 45 L Street NE Washington, District of Columbia 20554Clearance Level: Active DoD - Public TrustRequired Certification(s):• All NSOC personnel shall hold the CompTIA Security+ or CISSP certification at a minimum at all times during performance of this task order. Additionally, one EnCase Certified Examiner (EnCE) certification.• One GIAC Certified Incident Handler (GCIH) or GIAC Certified Intrusion Analyst (GCIA) certification is required.SUMMARYThis federal program has a Network Security Operations Center and requires a dedicated analyst to join the SOC team to perform analysis of cyber threats.Monitor and analyze network traffic, Intrusion Detection Systems (IDS), security events and logs and provide a technical resource and escalation point for tier 1 analyst.JOB DUTIES AND RESPONSIBILITIES• The candidate will Monitor and analyze network traffic, Intrusion Detection Systems (IDS), security events and logs and provide a technical resource and escalation point for tier 1 analysts. The candidate will perform incident response to investigate and resolve security incidents. The candidate will need to be able to determine between false and true positives events, prioritizing them appropriately and see them through from end to end. Additionally, the candidate will perform or review root cause analysis efforts following incident recovery. The candidate will compose security alert notifications and other communications on behalf of the SOCQUALIFICATIONSRequired Certifications• All NSOC personnel shall hold the CompTIA Security+ or CISSP certification at a minimum at all times during performance of this task order. Additionally, one EnCase Certified Examiner (EnCE) certification.• One GIAC Certified Incident Handler (GCIH) or GIAC Certified Intrusion Analyst (GCIA) certification is required.Education, Background, and Years of Experience• Bachelor's Degree from an accredited college and 5+ years experience in the field of cyber security with demonstrated experience in protecting information; monitoring systems and network events; detecting security attacks and breaches; coordinating responses to security incidents; and reporting vulnerabilities.• Demonstrated ability to work independently or under only general direction.ADDITIONAL SKILLS & QUALIFICATIONSRequired Skills• Understanding of command line scripting and implementation (e.g., Python, PowerShell)• Ability to write new content/searches/scripts (e.g., Splunk dashboards, Splunk ES alerts, SNORT signatures, Python scripts, PowerShell scripts)• Familiarity with Splunk Enterprise Security Strong understanding of networking (TCP Flags, TCP Handshake, IP addressing, Firewalls, Proxy, IDS, IPS)• Ability to perform Netflow / packet capture (PCAP) analysis• Experience with cyber threat huntingWORKING CONDITIONSEnvironmental Conditions• Schedule: Monday - Friday 6am - 2pm or 10am - 6pm. Onsite, 3 to 4 days a week in Washington, D.C.• Contractor site with 0%-10% travel possible. Possible off-hours work to support cyber-related incidents. General office environment. Work is generally sedentary in nature, but may require standing and walking for up to 10% of the time. The working environment is generally favorable. Lighting and temperature are adequate, and there are not hazardous or unpleasant conditions caused by noise, dust, etc. Work is generally performed within an office environment, with standard office equipment available.Strength Demands• Sedentary - 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required. Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.Physical Requirements• Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; SeeEmployees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.Happy - Be Infectious.Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.Helpful - Be Supportive.Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.Honest - Be Trustworthy.Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.Humble - Be Grounded.Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.Hungry - Be Eager.Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.Hustle - Be Driven.Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.Equal Opportunity Employer/Protected Veterans/Individuals with DisabilitiesThe contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
Agile Defense Glassdoor Company Review
4.7 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
Agile Defense DE&I Review
4.7 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
CEO of Agile Defense
Agile Defense CEO photo
Jay Lee
Approve of CEO

Average salary estimate

$90000 / YEARLY (est.)
min
max
$80000K
$100000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About SOC Analyst II, Agile Defense

If you're looking to join a dynamic team, then Agile Defense is the place for you as a SOC Analyst II! Based in vibrant Pasco, WA, you'll be stepping into a critical role within our Network Security Operations Center. Here, your day-to-day will involve monitoring and analyzing network traffic, Intrusion Detection Systems, and a myriad of security events and logs. Working alongside tier 1 analysts, you'll be the go-to technical resource, providing guidance and handling incidents as they arise, which is no small feat given the cyber threats we face today. You’ll differentiate between false positives and genuine risks, navigating the complexities of cyber incidents from inception to resolution. Your insights will also help shape our security protocols through root cause analyses and crafting alert notifications. To thrive in this role, you’ll need a minimum of five years’ experience in cybersecurity, along with certifications like CompTIA Security+ or CISSP, and ideally EnCE or GCIH. Our unique culture prioritizes our people, rooting our efforts in values that foster happiness, helpfulness, honesty, humility, hunger, and hustle. As part of Agile Defense, you won’t just be another employee; you’ll be part of a family dedicated to safeguarding our nation's vital interests. If challenging the status quo and innovating for future security is in your DNA, we’d love to hear from you!

Frequently Asked Questions (FAQs) for SOC Analyst II Role at Agile Defense
What are the primary responsibilities of a SOC Analyst II at Agile Defense?

A SOC Analyst II at Agile Defense is tasked with monitoring and analyzing network traffic and security events. This involves responding to incidents, determining the validity of alerts, conducting root cause analyses, and communicating security notifications effectively. The role is pivotal in ensuring cybersecurity and requires collaboration with tier 1 analysts to escalate and resolve threats.

Join Rise to see the full answer
What qualifications do I need to become a SOC Analyst II at Agile Defense?

To become a SOC Analyst II at Agile Defense, candidates must hold a Bachelor's Degree from an accredited college, alongside at least 5 years of experience in cybersecurity. Essential certifications include CompTIA Security+ or CISSP, and either EnCE or GIAC certifications. Familiarity with networking concepts and experience with tools such as Splunk is also required.

Join Rise to see the full answer
What certifications are mandatory for the SOC Analyst II role at Agile Defense?

Agile Defense requires all SOC personnel, including the SOC Analyst II, to have at least the CompTIA Security+ or CISSP certification. In addition, candidates must hold an EnCase Certified Examiner (EnCE) certification, and either a GIAC Certified Incident Handler (GCIH) or GIAC Certified Intrusion Analyst (GCIA) certification to ensure a high level of operational readiness.

Join Rise to see the full answer
What are the working conditions like for a SOC Analyst II at Agile Defense?

The working conditions for a SOC Analyst II at Agile Defense typically involve a Monday to Friday schedule. Analysts work on-site in a standard office environment, with 3 to 4 days required in Washington, D.C. Occasional off-hours work might be necessary to handle cyber incidents, while the physical requirement is mostly sedentary with light lifting.

Join Rise to see the full answer
What skills will I develop as a SOC Analyst II at Agile Defense?

As a SOC Analyst II at Agile Defense, you will enhance your skills in incident response, network traffic analysis, and threat detection. You will also gain experience in command-line scripting, developing security alerts and dashboards, and conducting Netflow and packet capture analysis, positioning you as a well-rounded cybersecurity professional.

Join Rise to see the full answer
Common Interview Questions for SOC Analyst II
Can you describe a time you responded to a security incident?

When asked about your experience responding to a security incident, provide a clear example that highlights your methodology. Discuss the situation, the steps you took to analyze and respond to the incident, and the outcome. Focus on how your actions prevented further issues and the lessons learned that led to improved security protocols.

Join Rise to see the full answer
How do you prioritize alerts as a SOC Analyst II?

In answering this question, outline your approach to threat classification. Discuss how you distinguish between false positives and true threats by evaluating event severity, potential impact, and available intelligence. Highlight any tools you use, such as SIEM systems, to help in this decision-making process.

Join Rise to see the full answer
What do you know about the latest security threats?

Stay updated on current security trends and major cyber threats. Discuss common recent vulnerabilities or attacks and explain their implications. Also, mention how you actively engage with resources like cybersecurity forums or news sites to keep your knowledge current, showing your commitment to professional development.

Join Rise to see the full answer
What scripting languages are you familiar with?

Discuss your proficiency in relevant scripting languages such as Python or PowerShell. Provide examples where you've used these languages to automate tasks, write security alerts, or improve analysis processes. Share any specific projects that showcase your skills and the impact they had on security operations.

Join Rise to see the full answer
How do you handle stress during critical incidents?

Explain your strategies for managing stress, especially during high-pressure situations. Discuss techniques such as prioritizing tasks, communicating with team members for support, and taking breaks if needed. Emphasize your ability to stay calm and collected, which is crucial for effective incident response.

Join Rise to see the full answer
Describe your experience with incident response planning.

Talk about your involvement in creating or revising incident response plans. Mention specific components you've contributed to, such as identifying critical infrastructure, developing communication protocols, or conducting drills. Highlight any successful responses that positively impacted your organization.

Join Rise to see the full answer
What tools do you use for network traffic analysis?

Be prepared to discuss the specific tools you're familiar with for network traffic analysis, such as Wireshark, Splunk, or ELK stack. Explain how you've utilized these tools in previous roles to monitor traffic, identify anomalies, and investigate potential security breaches.

Join Rise to see the full answer
How do you approach root cause analysis after an incident?

Explain your systematic approach to root cause analysis following an incident. Include steps such as data gathering, stakeholder interviews, and impact analysis. Provide examples of how your analyses have led to actionable recommendations that improved your organization's security posture.

Join Rise to see the full answer
What do you consider the most critical aspect of security operations?

Share your thoughts on what you find most vital in security operations, whether it's proactive threat hunting, rigorous monitoring, or effective communication within the team. Convey your understanding of the big picture and how each aspect contributes to overall cybersecurity effectiveness.

Join Rise to see the full answer
Why do you want to work at Agile Defense as a SOC Analyst II?

Express your enthusiasm for Agile Defense's innovative culture and mission. Address how your values align with those of the company, highlighting your eagerness to contribute to and grow within a team dedicated to national security and cutting-edge cybersecurity solutions.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 9 days ago
Photo of the Rise User
Acquco Remote 550 W 45th St, New York, NY 10036, USA
Posted 8 days ago
Photo of the Rise User
Posted 6 days ago
Photo of the Rise User
Posted 5 days ago
Photo of the Rise User
Posted 14 days ago
Photo of the Rise User
Posted 5 days ago

Agile Defense's mission is to transform our government customers' organizations using Information Technology so that they can meet their mission's deadlines with efficiency and quality.

92 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 4, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!