Remote | Nationwide (Based in Washington D.C. or Raleigh, NC Preferred)
US Citizenship or Green Card Status is Required - Ability to obtain a Public Trust
Summary
Our client is an employee and Service-Disabled, Veteran-owned Small Business focused on providing niche technical services. They are a team of experienced cybersecurity professionals with a track record of success in the Federal, Commercial, and Academic workspaces. Additionally, our client designs, builds, operates, and secures scalable cloud and IT infrastructures to meet their customers’ near-term needs and fulfill their long-term requirements.
Responsibilities
Our client is seeking a SOC Analyst – Tier II to join their team! In this role, you will investigate security events, correlate data across multiple sources, and drive rapid and effective responses that protect critical systems and information in a dynamic enterprise environment.
Identify cybersecurity problems that may require mitigating controls
Analyze network traffic to detect exploit or intrusion attempts
Recommend detection mechanisms for emerging threats
Provide subject-matter expertise on network-based attacks, traffic analysis, and intrusion methodologies
Escalate items needing deeper investigation to other Threat Management team members
Execute established playbooks and SOPs during incident response efforts
Manage email security with ProofPoint, monitoring for threats and responding swiftly
Configure Splunk for log analysis, create alerts, and investigate incidents diligently
Set up FirePower for network monitoring, analyze traffic patterns, and enforce security measures
Deploy SentinelOne agents, monitor alerts, and conduct thorough security assessments
Monitor, review, and respond to alerts across Microsoft Defender for Cloud Apps, Defender for Endpoint, Defender XDR, Defender for Office 365, Azure Entra ID, and Google Cloud SCC
Perform threat detection and analysis, investigate suspicious activity, coordinate response efforts, and implement remediation actions
Tune security policies, maintain visibility into cloud and endpoint environments, and support continuous improvement of the organization’s security posture
Requirements
Minimum 3 years of hands-on SOC or incident response experience within midsize or large enterprise environments
Proven skill in analyzing logs and threat indicators using SIEM platforms such as Splunk, Microsoft Sentinel, or Elastic
Proficiency in investigating EDR alerts and tuning policies on tools like SentinelOne, Defender for Endpoint, or CrowdStrike
Solid understanding of TCP/IP, standard network protocols, and packet analysis techniques to trace intrusions
Demonstrated ability to triage phishing campaigns and manage email security controls (e.g., ProofPoint, Defender for Office 365)
Working knowledge of configuring and interpreting security events from NGFWs, IDS/IPS, and FirePower devices
Familiarity with MITRE ATT&CK, NIST CSF, and incident response methodologies to guide investigation workflow
Experience securing and monitoring multi-cloud environments, including Azure and Google Cloud
Scripting or query language proficiency (Python, PowerShell, SPL, KQL) to automate detection and response tasks
Education/Certification Requirements
Preferred Qualifications
Clearance Requirements
If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.
Manage software assets and licensing compliance for Peraton at MacDill AFB supporting critical USSOCOM IT infrastructure.
Lead the strategy and execution of third-party information security risk management at American Express as Vice President, Third-Party Security.
Eko seeks an experienced Security Engineer to lead security efforts and safeguard their innovative healthcare technology platform.
Lead the strategy and operational management of enterprise security systems at AbbVie, driving innovative technology solutions to support business and security objectives.
Gain practical IT experience as a Digital Solutions Intern at Oshkosh, contributing to ServiceNow application development and business process support.
Experienced SAP Technical SME needed at LMI to lead complex government ERP projects and ensure integration compliance within DoD environments.
An experienced Salesforce professional is needed to lead release management and environment coordination for AssistRx’s complex Salesforce ecosystem.
Lead IT Specialist needed to manage system installations and business analysis for the Baltimore Department of Finance.
Experienced Staff IT Systems Engineer sought to architect and lead scalable, secure infrastructure and automation strategies at Oura, a leader in health technology.
Lead strategic IT portfolio management and execution for a top sales and marketing firm focused on consumer packaged goods.
A Cybersecurity Engineer role at American Express focused on developing and automating data access security controls using Java and cloud technologies.
Lead American Express's next-generation cybersecurity operations through AI and data innovation as a Staff Cybersecurity expert focused on Cyber Data & AI Transformation.