SOC Analyst
at SAIC
Atlanta, Georgia, USA -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 30 Jan, 2025 | Not Specified | 31 Oct, 2024 | 1 year(s) or above | Good communication skills | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
Job ID: 2414000
Location: ATLANTA, GA, US
Date Posted: 2024-10-29
Category: Cyber
Subcategory: Cybersecurity Ops
Schedule: Full-time
Shift: Day Job
Travel: No
Minimum Clearance Required: None
Clearance Level Must Be Able to Obtain: Public Trust
Potential for Remote Work: No
Description
SAIC is seeking a SOC Analyst in Atlanta, GA. This is support the Department of Health and Human Services (HHS) cybersecurity mission to ensure HHS can actively protect the vital health information with which it is entrusted, respond to existing and emerging cybersecurity threats, and continue to enhance the program to ensure HHS has the capability and capacity to respond to new and emerging requirements, technologies and threats.
This role is 100% on site in Atlanta, GA.
Job Duties:
- Collect, analyze, and correlate security events and use discovered data to enable recommendation of
mitigation of potential incidents within the enterprise as defined by Computer Security Incident
Response Center (CSIRC) methodology.
- Experience using investigative software such as SPLUNK and Net Witness.
- Identify events that pose a threat to the confidentiality, availability and integrity of information or
systems that may be indicative of a violation of federal law or HHS Policy.
- Perform incident triage to include determining accuracy, scope, urgency, and impact.
- Provide incident coordination and updates to the OpDiv Incident Response Teams (IRTs) and HHS
through prescribed CSIRC methodology.
- Notify CSIRC management and other HHS IRT members of suspected incidents and articulate the
event’s history, status and potential impact.
- Perform agency-wide event and incident tracking using ticket management system.
- Track and report on-going cyber security incidents to the primary incident handler.
- Respond to verified incidents utilizing a wide array of tools to mitigate active threats.
Qualifications
- Required Education and Experience: Must have at least 2 years of hands on IT SOC / Cybersecurity experience or closely related experience. would prefer 3 years of experience. Must have a Bachelors and 0-1 years of experience or additional years of experience in lieu of a degree.
- Certification Requirement: Industry standard cybersecurity certification, e.g. Security+ or similar is highly preferred.
- Clearance Requirement: Ability to obtain and maintain a Public Trust clearance.
SAIC accepts applications on an ongoing basis and there is no deadline.
Covid Policy: SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site
Responsibilities:
- Collect, analyze, and correlate security events and use discovered data to enable recommendation o
REQUIREMENT SUMMARY
Min:1.0Max:3.0 year(s)
Information Technology/IT
IT Software - Network Administration / Security
Other
Graduate
Proficient
1
Atlanta, GA, USA