Company Overview

For 29 years, clients in the private and public sectors have relied upon SOS International LLC (SOSi) for critical operations in the world’s most challenging environments. SOSi is privately held, was founded by its current ownership in 1989, maintains corporate headquarters in Reston, VA, and specializes in providing logistics, construction, training, intelligence, and information technology solutions to the defense, diplomatic, intelligence and law enforcement communities.

All interested individuals will receive consideration and will not be discriminated against on the basis of race, color, religion, sex, national origin, disability, age, sexual orientation, gender identity, genetic information, or protected veteran status. SOSi takes affirmative action in support of its policy to advance diversity and inclusion of individuals who are minorities, women, protected veterans, and individuals with disabilities.


5-180615-7003: Security Operations Center Analyst
LocationU.S. - Virginia - Fairfax
Open Date6/15/2018
  
JOB DESCRIPTION
 STG, Inc., a wholly owned subsidiary of SOS International LLC (SOSi) is seeking a talented Security Operations Center Analyst to its team in support of the United States Postal Service.  This position is located in Falls Church, Virginia. The SOC Analyst will monitor, analyze, detect, and respond to cyber events and incidents within information systems and networks in real time.

The ideal candidate will have the fundamental understanding of computer networking, operating systems, and multiple security technology (IDS, Splunk, Firewalls, etc.).  Candidates must have the ability to detect, correlate and escalate cybersecurity events, provide in-depth analysis, utilize case management, SIEM and similar tools, and prepare briefings and reports of findings under a 24/7/365 shift environment.

Key Responsibilities

  • Respond in real time to cyber security events.
  • Provide network threat analysis and reporting.
  • Actively monitor security threats and risks to provide in-depth incident analysis.
  • Evaluate security incidents to help provide proactive threat research.
  • Act as the single point of entry for all incoming events, alerts, or other reporting items.
  • Monitoring network traffic for security events and perform triage analysis to identify security incidents.
  • Respond to computer security incidents by collecting, analyzing, preserving digital evidence, and ensuring that incidents are recorded and tracked in accordance with all requirements.
  • Working closely with other teams to assess risk and provide recommendations for improving security posture.

 

MINIMUM REQUIREMENTS

  • 4+ years of related experience on a Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC).
  • Thorough knowledge of computer networking, operating systems, and multiple security technologies (IDS, Firewalls, Splunk)
  • Bachelors degree or 4+ years of experience with Cyber work.
  • Ability to obtain a security clearance

 

ADDITIONAL INFORMATION

Preferred Qualifications

  • Masters degree in Science, Business, or a technically related field.
  • One or more of the following certifications:
    • CompTIA Security+, Network+, A+
    • CPTE - Certified Penetration Testing Engineer or CEH - Certified Ethical Hacker
    • GCIH - (GIAC Certified Incident Handler)
    • ECIH - (EC-Council Certified Incident Handler)
    • CISA - Certified Information Systems Auditor