Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
SOC Analyst image - Rise Careers
Job details

SOC Analyst

RMC is hiring a Security Operations Center (SOC) Analyst to support IT work at NSWC Crane. The selected applicant will provide quality solutions in support of RDT&E network. Responsibilities in this position include but are not limited to{{:}}• Conduct log analysis for, but not limited to, HIPS, antivirus, DLP, IDS, system logs, AAA, and Web proxy logs and using specific tools such as Splunk, Orion, and MDE• Perform threat hunting activities to proactively identify hidden threats, malicious activity, and anomalies across systems and networks• Properly triage alerts upon detection of incidents and threats and collaborate with IT and network teams for remediation and recovery efforts• Collaborate with multiple teams to ensure alerts are efficiently tracked, escalated, and managed• Review and analyze known risks according to cybersecurity requirements• Mitigate identified risks to acceptable levels as determined by the ISSO, reducing the likelihood of impacts to systems• Support audits and ensure security controls meet regulatory standards• Create, maintain, and monitor SIEM dashboards, queries, reports, and alerts• Perform vulnerability assessments and work with relevant teams to remediate identified vulnerabilities• Provide accurate metrics, document incident findings, and detail actions taken for post-incident reporting• Assist in developing, maintaining, and testing incident response playbooks and standard operating procedures (SOPs)• Respond promptly to service requests and maintain the ticketing system with accurate task details. Documentation includes, but is not limited to, problem resolution, time spent, follow-up actions, resulting change requests or subtasks, and timely ticket closure• Participate in post-incident reviews and contribute to lessons learned to improve processes and reduce future risk• The ability to work independently and as part of a team in RDT&E environmentsSalary at RMC is determined by various factors, including but not limited to location, a candidate's specific combination of education, knowledge, skills, competencies, and experience. The salary range for this position is $50,000 - $75,000.RequirementsEDUCATION REQUIREMENT{{:• }} Two (2) years of relevant work experience and certifications/training are required CERTIFIACTION REQUIREMENT{{:• }} The selected applicants must have DoD 8570/5239 IAT Level II Certification (Security• +) Splunk Core Certified User preferr• ed CompTIA CYSA+ preferred BenefitsAt RMC, we're committed to your career growth! RMC differentiates itself from other firms through its investment in our employees. We invest our resources to train, certify, educate, and build our employees. RMC can offer you a great place to work with a small company feel and give you the experience, tuition assistance, and certifications that will take your career to the next level. We offer Monday to Friday full-time day shift work, and can assist in paid relocation. This also includes a competitive paid vacation package with 11 paid federal holidays. Additionally, we also offer high-quality, low-deductible healthcare plans, pet insurance, and a competitive 401K package.

Average salary estimate

$62500 / YEARLY (est.)
min
max
$50000K
$75000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About SOC Analyst, Resource Management Concepts, Inc.

Are you ready to take on a new challenge as a SOC Analyst with RMC at NSWC Crane in Indiana? We're excited to invite you to join our dynamic Security Operations Center team! In this role, you'll be at the frontline, conducting thorough log analysis across a range of essential systems, including HIPS, antivirus, and IDS, utilizing tools like Splunk and Orion to hunt down threats before they can affect our networks. Collaboration is key here, as you'll work closely with IT and network teams to triage alerts and devise effective remediation strategies for detected incidents. You’ll also play a vital role in vulnerability assessments, ensuring our systems are fortified against known risks. We’re looking for someone who is proactive and detail-oriented, especially when it comes to monitoring and maintaining our SIEM dashboards and incident response playbooks. At RMC, we value continuous learning and development; with our commitment to your career growth, you’ll have access to training, certifications, and plenty of opportunities to elevate your skills. Plus, enjoy a comfortable work-life balance with our Monday to Friday schedule, comprehensive healthcare options, and generous vacation time. If you’re passionate about cybersecurity and ready to contribute to exciting projects, then we want to hear from you. Join us and make a difference at RMC!

Frequently Asked Questions (FAQs) for SOC Analyst Role at Resource Management Concepts, Inc.
What are the primary responsibilities of a SOC Analyst at RMC?

As a SOC Analyst at RMC, your main responsibilities include conducting log analysis, performing threat hunting, triaging alerts, and collaborating with various teams to manage security incidents. You will also mitigate identified risks, perform vulnerability assessments, and maintain compliance with cybersecurity requirements.

Join Rise to see the full answer
What qualifications are needed to apply for the SOC Analyst position at RMC?

To qualify for the SOC Analyst role at RMC, candidates must have at least two years of relevant work experience along with the DoD 8570/5239 IAT Level II Certification (such as Security+) and ideally, the Splunk Core Certified User certification or CompTIA CYSA+. These qualifications ensure that you have the necessary skills and knowledge to thrive in this position.

Join Rise to see the full answer
How does collaboration work for SOC Analysts at RMC?

Collaboration for SOC Analysts at RMC is crucial as you will work with IT, network teams, and other stakeholders to track, escalate, and manage alerts efficiently. Teamwork is emphasized, especially when responding to incidents and conducting post-incident reviews to enhance future security processes.

Join Rise to see the full answer
What tools will I use as a SOC Analyst at RMC?

In the SOC Analyst position at RMC, you will primarily use tools like Splunk, Orion, and MDE for log analysis and threat hunting activities. Familiarity with these tools will be beneficial in detecting anomalies and responding to security incidents effectively.

Join Rise to see the full answer
What is the salary range for a SOC Analyst at RMC?

The salary range for a SOC Analyst at RMC is between $50,000 and $75,000, depending on various factors such as location, qualifications, and relevant work experience. RMC is committed to providing competitive compensation aligned with industry standards.

Join Rise to see the full answer
Common Interview Questions for SOC Analyst
Can you explain your experience with security information and event management (SIEM) tools?

During the interview, describe specific SIEM tools you have used, such as Splunk or others, detailing how you've utilized them for log monitoring, alert creation, and incident management. Highlight any specific contributions you've made in terms of improving detection rates or managing incidents.

Join Rise to see the full answer
What is your approach for conducting a threat hunt?

Discuss your systematic approach to threat hunting, including the steps you take to identify potential threats and how you analyze data from various sources. Make sure to highlight any methodologies you've followed and tools employed for successful hunts.

Join Rise to see the full answer
How do you prioritize alerts received from a monitoring system?

Explain how you evaluate the severity and contextual relevance of alerts, including any metrics or criteria you use to determine high-risk alerts over low-risk ones. You might want to provide an example of a past experience where this skill was critical.

Join Rise to see the full answer
What steps would you take if you discovered a serious vulnerability in a system?

Outline your response plan, including initial discovery measures, notification processes for relevant teams, and strategies for remediation. Emphasize the importance of documentation and follow-up to ensure closure on resolved vulnerabilities.

Join Rise to see the full answer
How do you stay current with cybersecurity threats and trends?

In your answer, mention specific resources you follow, such as cybersecurity forums, publications, and industry conferences. Discuss any communities you engage with to keep abreast of emerging threats and how you apply this knowledge in your role.

Join Rise to see the full answer
Can you describe an incident where you played a key role in resolution?

Prepare a detailed example of an incident you were involved in, explaining your role, the steps taken to analyze the situation, and how collaboration with other teams led to a successful remediation. Conclude with lessons learned and any improvements made to existing procedures.

Join Rise to see the full answer
What strategies would you implement to improve incident response times?

Discuss specific strategies you would employ, such as optimizing playbooks, enhancing communication channels among teams, and using metrics to analyze and reduce response times. Give examples of how you've successfully implemented similar strategies in the past.

Join Rise to see the full answer
How do you document incidents and actions taken?

Explain your process for accurate documentation, emphasizing the importance of thorough record-keeping in case analysis. Include the types of information recorded, tools used for documentation, and how this documentation aids in informing future incident response.

Join Rise to see the full answer
What are the essential components of an effective incident response plan?

Identify key components such as preparation, detection, analysis, containment, eradication, and recovery. Discuss how regularly testing and updating this plan can ensure its effectiveness, as well as your role in contributing to these updates.

Join Rise to see the full answer
How would you handle a situation where you are overwhelmed with alerts?

Mention specific strategies for managing alert overload, such as effective triaging methods, prioritizing critical alerts, and using automation tools where appropriate. Provide an example of a time when you successfully managed a high volume of alerts.

Join Rise to see the full answer
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
LOCATION
No info
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 21, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!