ATLANTA, GA, 30309, USA
1 day ago
SOC Analyst
**Description** SAIC is seeking a Junior SOC Analyst in Atlanta, GA. This is in support of the Department of Health and Human Services (HHS) cybersecurity mission to ensure HHS can actively protect the vital health information with which it is entrusted, respond to existing and emerging cybersecurity threats, and continue to enhance the program to ensure HHS has the capability and capacity to respond to new and emerging requirements, technologies and threats. **This role is 100% on-site in Atlanta, GA. Must be open to working either 1st, 2nd or 3rd shift based on the needs of the contract:** + 1st Shift: 7:00 AM - 5:00 PM + 2nd Shift: 3:00 PM - 1:00 AM + 3rd Shift: 9:00 PM - 7:00 AM **SOC Activities:** + Collect, analyze, and correlate security events and use discovered data to enable recommendation of mitigation of potential incidents within the enterprise as defined by Computer Security Incident Response Center (CSIRC) methodology. + Identify events that pose a threat to the confidentiality, availability and integrity of information or systems that may be indicative of a violation of federal law or HHS Policy. + Perform incident triage to include determining accuracy, scope, urgency, and impact. + Provide incident coordination and updates to the OpDiv Incident Response Teams (IRTs) and HHS through prescribed CSIRC methodology. + Notify CSIRC management and other HHS IRT members of suspected incidents and articulate the event’s history, status and potential impact. + Perform agency-wide event and incident tracking using ticket management system. + Track and report on-going cyber security incidents to the primary incident handler. + Respond to verified incidents utilizing a wide array of tools to mitigate active threats. + Make required outage and degradation notifications to stakeholders at intervals commemorate with problem severity. + Take part in structured tabletop exercises to simulate security incidents and contribute to the development of standardized response protocols. **Qualifications** **Required Education and Experience:** + Bachelor’s degree in Computer Science, Information Systems, Engineering or related field and 0-1+ years of experience or 4 years of experience in lieu of a degree. Must have the adequate knowledge and skills to learn and perform the described job. + Must have experience using investigative tools such as Splunk, NetWitness, or other industry-recognized SIEM platforms. + Must have 1 year of cybersecurity experience or relevant education/training in the cybersecurity field, preferably with a primary focus in a Security Operations Center (SOC) environment. + There are 3 shifts, 10 hours each. Must be open to working 1st, 2nd, or 3rd shift (4-10 schedule). **Certification Requirement:** + An industry-standard cybersecurity certification e.g., Security+, CySA+, GCIA, GSOC, Splunk, or a similar credential is highly preferred. **Clearance Requirement:** + Must be a U.S. Citizen with the ability to obtain and maintain a Public Trust clearance. REQNUMBER: 2507955 SAIC is a premier technology integrator, solving our nation's most complex modernization and systems engineering challenges across the defense, space, federal civilian, and intelligence markets. Our robust portfolio of offerings includes high-end solutions in systems engineering and integration; enterprise IT, including cloud services; cyber; software; advanced analytics and simulation; and training. We are a team of 23,000 strong driven by mission, united purpose, and inspired by opportunity. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $6.5 billion. For more information, visit saic.com. For information on the benefits SAIC offers, see Working at SAIC. EOE AA M/F/Vet/Disability
Por favor confirme su dirección de correo electrónico: Send Email