Contractor Digital Forensic SOC Analyst
Integres, LLC is hiring a remote Contractor Digital Forensic SOC Analyst. The career level for this job opening is Experienced and is accepting Crownsville, MD based applicants remotely. Read complete job description before applying.
Integres, LLC
Job Title
Posted
Career Level
Career Level
Locations Accepted
Share
Job Details
Report to Director of Security Operations or his/her designee.
Provide SOC Analyst Tier 3 escalation support.
Plan, initiate, and conduct investigations for cybersecurity incident response efforts.
Perform forensic examinations on compromised systems.
Understand and use forensic tools and techniques for cybersecurity incidents.
Create forensic root cause and scope of impact analysis reports.
Contribute to technical briefings on the details of forensics exams and reports.
Provide support in conducting malware analysis of attacker tools.
Stay current on incident response and digital forensics skills, best practices, and tools.
Train SOC analysts on usage of SIEM tools (Splunk), and basic event analysis.
Develop rules and tune SIEM and related tools to streamline the event analysis done by the SOC.
Assist developing new processes and procedures for SOC monitoring.
Monitor networks for threats from external and internal sources.
Analyze network traffic of compromised systems and networks.
Correlate actionable security events from various sources.
Review threat data and develop custom detection signatures.
Gather and analyze threat intelligence data and conduct threat hunting.
Understand cybersecurity attacks and tactics, techniques, and procedures (TTPs) associated with advanced threats.
Communicate clearly with Government counterparts, and SOC customers.
Development and implementation and operational and technical incident response processes, procedure, guidance, and standards.
Ability to work outside of regular business hours, the role may require on-call support after regular business hours or weekends.
Bachelor’s degree from an accredited college or university with a major in Computer Science, Information Systems, Engineering or a related scientific or technical discipline and 4+ years of experience. Associate degree and/or cyber courses/certifications or 5 years of experience in directly related fields may be substituted in lieu of bachelor’s degree.
Hands-on experience with security monitoring and SIEMs tools - Splunk Enterprise Security is preferred.
Demonstrated working knowledge of cyber forensics and incident handling best practice processes, procedures, standards, and techniques.
Hands-on experience with forensics image capture tools, i.e., FTK Imager and MAGNET ACQUIRE.
Hands-on experience with system image/file system/registry forensics tools (i.e., Encase, FTK, X-Ways, Magnet AXIOM, Sleuthkit, Access Data Registry Viewer, Registry Recon, or other).
Hands-on experience with PCAP analysis tools, i.e., Wireshark, TCP Dump, Network Miner, Xplico, or other.
Hands-on experience with memory forensics tools, i.e., BlackLight, Volatility, SANS SIFT, Magnet RAM Capture, or FireEye Memoryze, CrowdStrike Crowd Response.
Hands-on experience with Endpoint Detection & Response solutions - Tanium Threat Response, McAfee or other.