Please scroll down, To apply

JR Soc Analyst (Onsite Requirement) with Security Clearance

hiring now
New job

Deloitte

2024-11-08 04:43:11

Job location Arlington, Virginia, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS Cyber Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber minded culture and become stronger, faster, and more innovative. You will become part of a team that advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security. Our dynamic team offers opportunities to work with cutting-edge cyber security tools and grow both vertically and horizontally at an accelerated rate. Join our cyber team and elevate your career. Seeking a Cyber Incident Responder to support the Security Operations Monitoring and Incident Response team to proactively monitor network/bandwidth traffic and/or performance and audit logs which prevents network attacks and/or reactively identify network intrusions and/or anomalous security incidents across the enterprise. Work You'll Do: The Jr Security Analyst will monitor and analyze security events and alerts reported by the client SIEM on a 24x7x365 basis to identify and investigate suspicious or malicious activity, or other cyber events which violate client policy. The analyst will be responsible for analyzing logs and events from any other device types which may send logs or events to the client SOC in the future. Non-traditional device feeds will deliver data to the SIEM architecture (e.g., Human Resources (HR) data, badging information, and physical security devices, etc.). The analyst will provide documentation detailing any additional information collected and maintained for each security investigation. The analyst will record all artifacts (i.e. emails, logs, documents, Uniform Resource Locators (URLs), screenshots, etc.) associated with all security events and incident investigations within the client SOC incident and tracking application. The team Deloitte's Government and Public Services (GPS) practice - our people, ideas, technology and outcomes-is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of more than 15,000 professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise. At Deloitte, we believe cyber is about starting things-not stopping them-and enabling the freedom to create a more secure future. Cyber Strategy, Defense and Response (SDR) focuses on helping federal clients design and implement transformational enterprise security programs with an emphasis on defending against, recovering from, and mitigating major cyberattacks. If you're seeking a career that increases cyber awareness, utilizes risk management programs, and develops strategies for cyber defense and response, then the Cyber SDR offering at Deloitte is for you. Qualifications Required: Bachelor's degree required 1+ years of experience working in a Security Operations Center (SOC) or Network Operations Center (NOC) environment performing security event monitoring and analysis Working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks. Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.) Must be capable of analyzing security logs and events from the following types of devices Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future. Must have an Active Secret Clearance This position has a 24/7 shift work requirement. It will be staffed in shifts, to include overnights and weekends. The possibility of shift changes may arise at any time in the future. Current shift needs to cover Thursday, Friday, Saturday, and every other Wednesday from 6 AM- 6PM EST. Preferred: Prior professional services or federal consulting experience Certifications (e.g., GIAC Certified Incident Handler (GCIH); EC- council's certified incident Handler (ECIH) Information for applicants with a need for accommodation:

Inform a friend!

<!– job description page –>
Top