Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
SOC Analyst Lead Job at Agile Defense in Pasco image - Rise Careers
Job details

SOC Analyst Lead Job at Agile Defense in Pasco

Requisition 523 Job Title: SOC Analyst Lead Clearance Level: Active DoD - Public Trust Required Certification(s): • All personnel shall hold the CompTIA Security or CISSP certification at a minimum at all times during performance of this task order. Additionally, one EnCase Certified Examiner (EnCE) certification. • One GIAC Certified Incident Handler (GCIH) or GIAC Certified Intrusion Analyst (GCIA) certification is required. SUMMARY Agile Defense is currently seeking a talented and ambitious self-starting Security Operations Center (SOC) Analyst Lead with advanced skillsets in cyber security with emphasis on applied cloud security to develop operational strategy in the effort to continually move forward the skills and capabilities of our dynamic team of security analysts for a variety of federal customers. The ideal candidate will have hands-on experience as a SOC analyst performing Incident Response and Intrusion Detection on an operational Federal network, ideally having been migrated to a cloud environment, specifically, the Microsoft Sentinel SIEM and related security portals in Azure. Candidates should have excellent written and oral communication skills, be able to work independently and as part of a team, with demonstrated leadership capabilities. Skills and experience in Operations Management, Security Event Analysis, Incident Response, Cyber Hunt, Forensics, Malware Analysis, and Cyber Threat Intelligence (skills in more than one cyber discipline are preferred) are required for this position. The ideal candidate will have hands-on experience supporting a 24x7x365 SOC environment as an analyst or engineer, experience as a technical team lead within the SOC, and operations management experience. A solid understanding of cyber threats and information security in the domains of TTP's, Threat Actors, Campaigns, and Observables. Additionally, the ideal candidate would be familiar with intrusion detection systems, intrusion analysis, security information event management platforms, endpoint threat detection tools, and security operations ticket management. Corporate duties such as solution/proposal development, corporate culture development, mentoring employees, supporting recruiting efforts, will also be required. JOB DUTIES AND RESPONSIBILITIES • Manage a SOC to provide cyber defense capabilities to a federal entity in a comprehensive Computer Network Defense support service through security event monitoring, advanced analytics and response, and cyber intelligence activities. • Conduct quality assurance reviews of all SOC activities through reviewing of metrics and case analysis while reporting to the Program Manager. • Serve as a technical Cyber SME and onsite Task Lead. • Maintain a 24x7 schedule and minimum-manning requirements. • Lead efforts Planning, organization, scheduling and progress reporting of various projects. • Construct and optimize operational workflows for 24x7 teams across multiple shifts. • Develop, collect, analyze security operational metrics to optimize SOC performance and minimize organizational risk. • Research, evaluate, recommend, and design new security technologies and supporting infrastructure. • Develop technical cyber security solutions in response to customer requests or in support of proposal solution development. • Provide technical writing support in support of corporate response to RFPs/RFQs from various customers. • Support new XOR engagements as transitional program or operations lead. • Support documentation of all business and workflow processes in this area. • Provides technical consultation in cyber security capability development. • Maintains current knowledge of relevant cyber security and related technologies as assigned. • Serves as liaison with various customers (internal and external). • Acts as a subject-matter expert to multiple tasks and/or programs. SUPERVISORY DUTIES • Experience in mentoring and training junior, mid-level, and senior analysts. QUALIFICATIONS Required Certifications • All personnel shall hold the CompTIA Security or CISSP certification at a minimum at all times during performance of this task order. Additionally, one EnCase Certified Examiner (EnCE) certification. • One GIAC Certified Incident Handler (GCIH) or GIAC Certified Intrusion Analyst (GCIA) certification is required. Education, Background, and Years of Experience • Education and Experience: Bachelor's Degree from an accredited college ADDITIONAL SKILLS & QUALIFICATIONS Required Skills • 8 years experience in the field of cyber security with demonstrated experience in the following areas: implementation of information engineering projects; systems analysis, design and programming; systems planning; business information planning; and business analysis. • Work independently to design cloud security operations strategy and report progress. • Experience with Splunk • MS tools such as Active Directory, Azure Active Directory, AD Connect, SAML, Kerberos, Cisco IOS, MS Server, Azure cloud environments, Incident Handling, Threat hunting experience, fundamental knowledge of IEEE 7 layers. • Experience with deployment and documentation of enterprise project management and change management processes. • Ability to identify solutions to potential network/data/asset issues/embrace network simplification and apply strengthened security methods. • Ability to conduct event triage and analysis and incident investigation. • Write threat reports and incident reports. • Read and ingest various govt. regulations for application to agency environment. Preferred Skills • Proficiency in utilizing various packet capture (PCAP) applications/engines and in the analysis of PCAP data. • Ability to develop rules, filters, views, signatures, countermeasures and operationally relevant applications and scripts to support analysis and detection efforts. WORKING CONDITIONS Environmental Conditions • Onsite 3 - 4 days a week in Washington, D.C. Strength Demands • Sedentary - 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required. Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met. Physical Requirements • Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; See; Push or Pull; Climb (stairs, ladders) or Balance (ascend / descend, work atop, traverse).
Agile Defense Glassdoor Company Review
4.7 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
Agile Defense DE&I Review
4.7 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
CEO of Agile Defense
Agile Defense CEO photo
Jay Lee
Approve of CEO

Average salary estimate

Estimate provided by employer
$53568 / ANNUAL (est.)
min
max
$46K
$61K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About SOC Analyst Lead Job at Agile Defense in Pasco, Agile Defense

Join Agile Defense in Pasco, WA as a SOC Analyst Lead and take your cybersecurity career to the next level! As a vital part of our Security Operations Center, you will be on the front lines of protecting federal networks from cyber threats. In this role, you’ll leverage your deep understanding of intrusion detection systems, security event analysis, and incident response to manage our 24x7 SOC operations. You’ll work closely with a dynamic team of skilled analysts and lead efforts in developing operational strategies that enhance our team's capabilities. Your expertise in areas such as cloud security, particularly with Microsoft Sentinel SIEM in Azure, will be key in creating innovative security solutions to meet our clients' needs. We're looking for someone with excellent communication skills who can mentor other analysts while pursuing continuous improvement within our security protocols. In addition to hands-on technical responsibilities, you’ll engage in planning, scheduling, and cross-functional collaboration with internal and external stakeholders, ensuring that we consistently deliver top-notch cyber defense services. If you have the ambition and experience, including certifications like CompTIA Security, CISSP, and multiple GIAC credentials, we want to hear from you! At Agile Defense, your contributions directly impact the security landscape, making this a fulfilling opportunity for an experienced SOC Analyst Lead.

Frequently Asked Questions (FAQs) for SOC Analyst Lead Job at Agile Defense in Pasco Role at Agile Defense
What are the primary responsibilities of a SOC Analyst Lead at Agile Defense?

As a SOC Analyst Lead at Agile Defense, you are responsible for managing the Security Operations Center which includes ensuring around-the-clock cyber defense capabilities, conducting quality assurance reviews, and leading cyber operations management. You will oversee incident response initiatives, analyze security events, and develop strategic operational workflows to enhance team performance.

Join Rise to see the full answer
What certifications are required for the SOC Analyst Lead position at Agile Defense?

To qualify for the SOC Analyst Lead role at Agile Defense, you must hold several key certifications, including CompTIA Security or CISSP, an EnCase Certified Examiner (EnCE) certification, and either a GIAC Certified Incident Handler (GCIH) or GIAC Certified Intrusion Analyst (GCIA) certification. Maintaining these certifications is essential throughout your employment.

Join Rise to see the full answer
What experience is needed to apply for the SOC Analyst Lead position at Agile Defense?

Applicants for the SOC Analyst Lead role at Agile Defense should possess at least 8 years of cybersecurity experience, particularly in incident handling, threat hunting, and event analysis. Additionally, hands-on experience with cloud environments, especially Microsoft Azure, as well as leadership roles within a SOC, are highly advantageous.

Join Rise to see the full answer
How does a SOC Analyst Lead contribute to Agile Defense's operational strategy?

In the SOC Analyst Lead role at Agile Defense, you contribute to operational strategy by developing security solutions tailored to client needs, mentoring junior analysts, and optimizing workflows to improve SOC performance. Your insights into current cyber threats help shape proactive approaches that fortify our defense capabilities.

Join Rise to see the full answer
What skills are emphasized for the SOC Analyst Lead at Agile Defense?

The SOC Analyst Lead at Agile Defense should emphasize skills in incident response, cyber threat intelligence, forensics, and security event analysis. Familiarity with security information event management systems and the ability to mentor and lead a team are also critical for success in this role.

Join Rise to see the full answer
Common Interview Questions for SOC Analyst Lead Job at Agile Defense in Pasco
Can you describe your experience with incident response in your previous SOC roles?

In answering this question, share specific examples of how you've efficiently handled various incidents, detailing the workflow you followed, tools used during the process, and the outcomes. Highlight your role in team leadership and your ability to adapt under pressure.

Join Rise to see the full answer
What methodologies do you use for threat hunting and analysis?

When discussing methodologies for threat hunting, emphasize a structured approach such as using frameworks like MITRE ATT&CK. Talk about the tools you've used, such as Splunk or SIEM systems, and how you integrate threat intelligence to proactively search for anomalies.

Join Rise to see the full answer
How do you stay updated with the latest cybersecurity threats and trends?

To effectively answer this question, explain your routine for continuous learning, including following cybersecurity blogs, attending webinars, participating in industry forums, and how you apply this knowledge in your work environment to mitigate risks.

Join Rise to see the full answer
What key metrics do you consider when evaluating the performance of a SOC?

Discuss metrics like mean time to detect (MTTD), mean time to respond (MTTR), and incident closure rates. Explain how you use these metrics to assess SOC effectiveness and enhance operational performance through data-driven decisions.

Join Rise to see the full answer
Can you provide an example of a challenging cyber incident you managed?

Choose a significant incident that showcases your problem-solving skills and leadership; detail the challenges faced, your approach to managing the situation, teamwork, and the successful resolution.

Join Rise to see the full answer
How do you mentor junior analysts in a SOC environment?

Talk about the strategies you adopt for mentoring, such as one-on-one training sessions, pair programming, or conducting workshops. Highlight any successes you've had in developing team members and improving their technical skills.

Join Rise to see the full answer
What role does collaboration play in the functionality of a SOC?

In answering this, highlight the importance of communication among team members, collaboration with other departments, and building relationships with stakeholders. Use examples to illustrate how collaborative efforts have led to successful incident management.

Join Rise to see the full answer
What is your experience with cloud security, specifically in Microsoft Azure?

Share specific projects or responsibilities that illustrate your expertise in cloud security, focusing on your familiarity with Azure security tools, the challenges faced, and how you ensured robust cloud security practices.

Join Rise to see the full answer
How do you promote a positive cybersecurity culture within your SOC team?

Describe initiatives you've taken to foster a supportive atmosphere, such as team-building activities, promoting knowledge sharing, or encouraging creativity in solving cybersecurity issues.

Join Rise to see the full answer
What strategies do you implement for continuous improvement in SOC operations?

Discuss how you assess current processes, gather feedback from team members, track performance metrics, and develop actionable plans to iterate and enhance SOC operations.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 6 days ago
Photo of the Rise User
TEKWISSEN LLC Hybrid Va Hosp, Roanoke, VA, USA
Posted yesterday
Posted 13 hours ago
Photo of the Rise User
Posted yesterday
Photo of the Rise User
Inclusive & Diverse
Collaboration over Competition
Fast-Paced
Growth & Learning
Empathetic
Xyant Technology, Inc. Remote Tampa Riverwalk, Tampa, FL 33602, USA
Posted 8 days ago
Photo of the Rise User
Posted 6 days ago
Photo of the Rise User
ServiceNow Remote Salarpuria Sattva Knowledge City Knowledge City, Unit II, 17 to 10 Floor Survey No. 83/1, Serilingampally Mandal, Hyderabad, India
Posted 8 days ago
Inclusive & Diverse
Mission Driven
Rise from Within
Diversity of Opinions
Work/Life Harmony
Empathetic
Feedback Forward
Take Risks
Collaboration over Competition
Medical Insurance
Dental Insurance
Vision Insurance
Mental Health Resources
Life insurance
Disability Insurance
Health Savings Account (HSA)
Flexible Spending Account (FSA)
Conferences Stipend
Paid Time-Off
Maternity Leave
Equity

Agile Defense's mission is to transform our government customers' organizations using Information Technology so that they can meet their mission's deadlines with efficiency and quality.

117 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 1, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!