Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Security Operation Center (SOC) Analyst II image - Rise Careers
Job details

Security Operation Center (SOC) Analyst II - job 1 of 3

Type of Requisition:RegularClearance Level Must Currently Possess:Top Secret/SCIClearance Level Must Be Able to Obtain:Top Secret SCI + PolygraphPublic Trust/Other Required:NoneJob Family:Cyber SecurityJob Qualifications:Skills:Cybersecurity, Information Security, System SecurityCertifications:Cisco Certified Network Associate (CCNA) Security - Cisco, GICSP: Global Industrial Cyber Security Professional - Global Information Assurance Certification (GIAC), GSEC: GIAC Security Essentials Certification - Global Information Assurance Certification (GIAC)Experience:5 + years of related experienceUS Citizenship Required:YesJob Description:The SOC Analyst’s primary function is to provide comprehensive Computer Network Defense and Response support through 24×7×365 monitoring and analysis of potential threat activity targeting the enterprise. This position will conduct security event monitoring, advanced analytics and response activities in support of the government’s mission. This position requires a solid understanding of cyber threats and information security in the domains of TTP's, Threat Actors, Campaigns, and Observables. Additionally, this candidate must be familiar with intrusion detection systems, intrusion analysis, security information event management platforms, endpoint threat detection tools, and security operations ticket management. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.Performance shall include:• Must have strong analytical and technical skills in computer network defense operations, ability to lead efforts in Incident Handling (Detection, Analysis, Triage), Hunting (anomalous pattern detection and content management) and Malware Analysis• Experience and ability to with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents. This includes security event triage, incident investigation, implementing countermeasures, and conducting incident response.• Must be knowledgeable and have hands-on experience with a Security Information and Event.• Monitoring (SIEM) platforms and/or log management systems that perform log collection, analysis, correlation, and alerting.• Strong logical/critical thinking abilities, especially analyzing security events (windows event logs, network traffic, IDS events for malicious intent).• Excellent organizational and attention to details in tracking activities within various Security Operation workflows.• A working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks, a conceptual understanding of Windows Active Directory is also required, and a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.).• Experience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment.• Experience with one or more of the following technologies Network Threat Hunting, Big Data Analytics, Endpoint Threat Detection and Response, SIEM, workflow and ticketing, and Intrusion Detection System.Experience:• 5+ years related experience• Prior performance in roles such as ISSO or ISSM.• SAP experience requiredEducation:• Bachelor’s degree in a related area or equivalent experience (4 years)Certifications:• CSSP Analyst - required to Start (CEH, CFR, CCNA Cyber Ops, CySA+**, GCIA, GCIH, GICSP, SCYBER)Clearance Required to Start:• TS/SCI required• Must be able to Attain – TS/SCI with CI Polygraph#AirforceSAPOpportunitiesThe likely salary range for this position is $106,371 - $129,605. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.Scheduled Weekly Hours:40Travel Required:10-25%Telecommuting Options:OnsiteWork Location:USA CO Colorado SpringsAdditional Work Locations:Total Rewards at GDIT:Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 30 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.We connect people with the most impactful client missions, creating an unparalleled work experience that allows them to see their impact every day. We create opportunities for our people to lead and learn simultaneously. From securing our nation’s most sensitive systems, to enabling digital transformation and cloud adoption, our people are the ones who make change real.GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
General Dynamics Information Technology Glassdoor Company Review
3.9 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
General Dynamics Information Technology DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of General Dynamics Information Technology
General Dynamics Information Technology CEO photo
Amy Gilliland
Approve of CEO

Average salary estimate

Estimate provided by employer
$82500 / ANNUAL (est.)
min
max
$75K
$90K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Security Operation Center (SOC) Analyst II, General Dynamics Information Technology

As a Security Operation Center (SOC) Analyst II at GDIT in Monument, CO, you will play a crucial role in protecting our nation's most sensitive systems. This exciting position involves 24/7 monitoring and analysis of potential threats targeting our enterprise. You'll be at the forefront of the cyber defense effort, employing advanced analytics and responding to security events that require swift action. Your expertise in analyzing information technology security events will help you discern between legitimate security incidents and false alarms, allowing you to effectively triage and investigate incidents. You will use your strong analytical skills to lead incident detection, malware analysis, and hunting for anomalous patterns. It's essential to have a solid grasp of various operating systems and networking protocols, coupled with hands-on experience in Security Information and Event Management platforms. With 5+ years of relevant experience and necessary certifications like GSEC or CCNA Security, you're equipped to not only safeguard operations but also thrive in a collaborative environment that values innovation and professional growth. Join our mission at GDIT, where your work truly makes an impact, and be part of a team that delivers cutting-edge technological solutions to keep our nation safe.

Frequently Asked Questions (FAQs) for Security Operation Center (SOC) Analyst II Role at General Dynamics Information Technology
What are the primary responsibilities of a Security Operation Center (SOC) Analyst II at GDIT?

As a Security Operation Center (SOC) Analyst II at GDIT, your primary responsibilities will include continuous monitoring of the organization's network for potential security threats, incident detection and response, and performing deep analyses of security events. You will also lead incident handling efforts and work on malware analysis, using your analytical skills to enhance the cybersecurity posture of the organization.

Join Rise to see the full answer
What qualifications are needed for a SOC Analyst II position at GDIT?

To qualify for the SOC Analyst II position at GDIT, candidates generally need a Bachelor’s degree in a related field or equivalent experience, along with at least 5 years of relevant cybersecurity experience. Familiarity with intrusion detection, security event management systems, and applicable certifications such as CCNA Security or GSEC are also important for this role.

Join Rise to see the full answer
How does GDIT support the mission of the Security Operation Center (SOC) Analyst II?

GDIT supports the mission of the SOC Analyst II through a strong commitment to collaboration, innovative technology solutions, and professional development opportunities. The company provides access to robust tools necessary for cybersecurity, ensures ongoing training, and fosters an environment that encourages knowledge sharing and career growth among its experts.

Join Rise to see the full answer
What kind of work environment does a SOC Analyst II at GDIT experience?

At GDIT, as a SOC Analyst II, you will experience a dynamic work environment that values agility and strategic thinking. You'll work closely with a team of skilled professionals and be exposed to various security challenges that encourage professional growth in cybersecurity practices while contributing to critical defense missions.

Join Rise to see the full answer
What benefits does GDIT offer to SOC Analyst II employees?

GDIT offers a comprehensive benefits package to SOC Analyst II employees, including health plans, 401(k) options, flex work weeks, generous paid time off, and disability insurance. These benefits are designed to support work-life balance and ensure that employees feel valued while they focus on securing critical information and systems.

Join Rise to see the full answer
Common Interview Questions for Security Operation Center (SOC) Analyst II
Can you describe your experience with security event monitoring tools?

When answering this question, emphasize specific tools you have utilized, such as SIEM platforms. Describe your role in monitoring, analyzing events, and how you have responded to security incidents in previous positions.

Join Rise to see the full answer
What steps do you take to analyze a potential security incident?

Outline your methodical approach to incident analysis, which should include initial triage, collecting relevant logs and data, analyzing patterns, and utilizing forensic techniques to support your findings. Be detailed about the tools and techniques you use.

Join Rise to see the full answer
How do you stay current with the latest cybersecurity threats?

Highlight your commitment to continuous learning, which may include attending training, certification courses, reading industry publications, and participating in forums or webinars. Mention any specific resources you follow for the latest threat intelligence.

Join Rise to see the full answer
What experience do you have with malware analysis?

Discuss specific experiences where you were involved in malware analysis, including identifying indicators of compromise (IOCs), using tools like antivirus software or sandboxing technologies, and the role this analysis played in your incident response efforts.

Join Rise to see the full answer
Can you explain your experience with incident response protocols?

Mention any established protocols you followed in previous roles, discussing your experience during actual incidents, and how you coordinated with teams. Emphasize communication skills and documentation processes that contributed to effective responses.

Join Rise to see the full answer
Describe a time you successfully identified and mitigated a cybersecurity threat?

Provide a specific example of a cybersecurity threat you encountered, detailing the steps you took to identify it and the response measures that led to successful mitigation. Highlight collaboration with team members and any tools used during the process.

Join Rise to see the full answer
What are the key elements of a robust cybersecurity strategy?

Discuss essential elements such as continuous monitoring, incident response planning, employee training, compliance with regulations, technology deployment, and regular assessments. Provide examples from your experience where these elements were implemented.

Join Rise to see the full answer
How do you ensure effective communication with your team during high-pressure situations?

Explain your communication strategy during stressful situations, such as maintaining clarity, predefined roles, and using collaboration tools. Share examples of how these strategies contributed to effective incident management.

Join Rise to see the full answer
What role does risk assessment play in your approach to cybersecurity?

Describe how you conduct risk assessments, prioritizing threats based on their potential impact, and how this informs your security strategy. Offer specific tools or methodologies you utilize in your assessments.

Join Rise to see the full answer
Why do you want to work as a SOC Analyst II at GDIT?

Articulate your alignment with GDIT's mission and values. Focus on your career aspirations, interest in contributing to national security, and how your goals align with GDIT's work in defense and technology solutions.

Join Rise to see the full answer

At GDIT, we deliver the resources, solutions, and experience at the most critical moments of change. 50 years of experience. 30,000 everyday heroes.

234 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 5, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!