Mid - SOC Analyst / Splunk Administrator
6 hours ago
Washington DC (Hybrid 1 day a week in office)
Onsite on Tuesdays 7 AM to 3:30 PM
Public Trust
This position is a hybrid position designed to bridge SOC Analysis with Splunk Engineering and Content Creation. The candidate should have competency with administering Splunk, creating custom content with SPL, data administration in a SIEM, and performing security investigations through Splunk ES.
The mid-tier candidate will have a solid understanding of cyber threats and information security in the domains of TTP's, Threat Actors, Campaigns, and Observables and be proficient administering Splunk and creating Splunk dashboards and notables.
Additionally, the ideal candidate would be familiar with tools commonly deployed in a SOC environment such as intrusion detection systems, intrusion analysis systems, security information event management platforms (SIEM), endpoint threat detection tools, and security operations ticket management.
REQUIRED Qualifications:
Ability to obtain a Public Trust clearance.
Minimum 2-5 years of experience in network defense environments.
Splunk Admin Certification
Strong analytical and technical skills in computer network defense operations, ability to lead efforts in Incident Handling (Detection, Analysis, Triage), Hunting (anomalous pattern detection and content management) and Malware Analysis.
Prior experience and ability with analyzing information technology security events to discern true positive incidents from false positive events. This includes security event triage, incident investigation, implementing countermeasures, and conducting incident response.
Hands-on experience with managing and optimizing Splunk Enterprise Security including configuring and maintaining Splunk infrastructure.
Hands on experience with managing data sources, data alignment, and data curation. This includes troubleshooting missing events, working with data source owners to onboard new data sources and/or troubleshoot existing ones.
Hands on experience with dashboard and notable creation - visualizations, report generation, and general content creation.
Ability to develop rules, filters, views, signatures, countermeasures and operationally relevant applications and scripts to support analysis and detection efforts.
Strong logical/critical thinking abilities, especially analyzing security events from host and network event sources e.g., windows event logs, AV, EDR, network traffic, IDS events for malicious intent).
Excellent organizational abilities and attention to details in tracking activities within various Security Operation workflows.
A working knowledge of the various operating systems (e.g., Windows, OS X, Linux, etc.) commonly deployed in enterprise networks, a conceptual understanding of Windows Active Directory is also required, and a working knowledge of network communications and routing protocols (e.g., TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g., SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.).
Experience with the identification and implementation of countermeasures or mitigating controls for deployment and implementation in the enterprise network environment.
Strong written and verbal communication skills.
Desired Qualifications:
An understanding in researching Emerging Threats and recommending monitoring content within security tools.
Experience with one or more of the following technologies, specific tools: FireEye, Palo Alto, full MS O365 suite (compliance center).
Relevant certifications: Security+,CySA+, GCIA, GCIH, or similar.
Experience with scripting or automation.
Familiarity with cloud security monitoring (e.g., AWS, Azure).
Education:
BS degree preferred
Position Details:
- Pay Rate / Range: $62.45- $67.45
- Benefits (Regular, Full Time Employees):
- Medical, Dental, and Vision offerings
- Weekly Direct Deposit
- Paid Holidays and Personal Time Off
- 401(k) with match
- Voluntary Life and AD&D, Short / Long Term Disability, plus other voluntary coverages
- Pre-Paid Legal and Employee Assistance Programs
- Northwest Federal Credit Union Membership
- BB&T @ Work Program
ABBTECH is an EOE/Minorities/Women/Disabled Individuals/Veterans
-
SOC Analysts
1 week ago
Washington, DC, United States eTeam Full timeWe are looking for a proactive and analytical Security Operations Center (SOC) Analyst to join our AI-driven threat detection and incident response team. The ideal candidate will be experienced in monitoring, analyzing, and responding to security threats using both traditional methods and modern AI-powered tools. Key Responsibilities: Monitor and analyze...
-
SPLUNK Administrator
2 days ago
Washington, DC, United States BAE Systems USA Full timeJob Description BAE Systems is seeking an experienced full-time on-site SPLUNK Administrator at Washington Navy Yard to support our work as a prime contractor on a high-profile U.S. Navy weapon system. Accuracy, integrity, subject matter expertise, and the ability to work well independently and with others are important traits we expect the successful...
-
SPLUNK Administrator
3 days ago
Washington, DC, United States BAE Systems USA Full timeJob Description BAE Systems is seeking an experienced full-time on-site SPLUNK Administrator at Washington Navy Yard to support our work as a prime contractor on a high-profile U.S. Navy weapon system. Accuracy, integrity, subject matter expertise, and the ability to work well independently and with others are important traits we expect the successful...
-
SPLUNK Administrator
5 hours ago
Washington, DC, United States BAE Systems USA Full timeJob Description BAE Systems is seeking an experienced full-time on-site SPLUNK Administrator at Washington Navy Yard to support our work as a prime contractor on a high-profile U.S. Navy weapon system. Accuracy, integrity, subject matter expertise, and the ability to work well independently and with others are important traits we expect the successful...
-
IT Security Operations Analyst
3 days ago
Washington, DC, United States DecisionPoint | Cortek Full timeOverview The Government Publishing Office (GPO) SecDevOps program provides advanced security, development, and operations support to safeguard federal information systems and infrastructure. This initiative integrates cybersecurity best practices with agile development and IT operations to ensure continuous security, compliance, and resilience across GPO's...
-
Incident Detection Analyst
4 days ago
Washington, DC, United States Tyto Athene, LLC Full timeDescription Tyto Athene is searching for a Incident Detection Analyst to support our customer in Washington, DC. Responsibilities: Accurately review, annotate, and resolve security incidents tasked by the Intrusion Detection Team, Watch Officer, SOC management or other SOC teams 24 hours a day, 7 days a week, which is subject to change based on AOUSC...
-
Incident Detection Analyst
1 week ago
Washington, DC, United States Tyto Athene, LLC Full timeDescription Tyto Athene is searching for a Incident Detection Analyst to support our customer in Washington, DC. Responsibilities: Accurately review, annotate, and resolve security incidents tasked by the Intrusion Detection Team, Watch Officer, SOC management or other SOC teams 24 hours a day, 7 days a week, which is subject to change based on AOUSC...
-
Tier 2 SOC Analyst
2 weeks ago
Washington, DC, United States Agile Defense Full timeAt Agile Defense we know that action defines the outcome and new challenges require new solutions. That's why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next. Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of...
-
Splunk SOAR Cyber Automation Engineer
2 weeks ago
Washington, DC, United States Booz Allen Hamilton Full timeSplunk SOAR Cyber Automation Engineer Key Role: Lead the design and development of solutions to automate Cyber and Cloud services and activities. Develop and optimize data workflows and solution architectures that allow for intelligent storage, query, and exploration of datasets for Cyber and Cloud operations and engineering. Work closely with clients to...
-
Splunk SOAR Cyber Automation Engineer
2 weeks ago
Washington, DC, United States Booz Allen Hamilton Full timeSplunk SOAR Cyber Automation Engineer Key Role: Lead the design and development of solutions to automate Cyber and Cloud services and activities. Develop and optimize data workflows and solution architectures that allow for intelligent storage, query, and exploration of datasets for Cyber and Cloud operations and engineering. Work closely with clients to...