Posted in

Lead Tier 2 SOC Analyst

Lead Tier 2 SOC Analyst

CompanyAgile Defense
LocationWashington, DC, USA
Salary$Not Provided – $Not Provided
TypeFull-Time
DegreesBachelor’s
Experience LevelMid Level, Senior

Requirements

  • SOC Analyst or equivalent certification is required. (Equivalent certification covers similar level of information security domains or depth of knowledge and or experience.)
  • Bachelor’s degree in Computer Science or IT related disciplines
  • 3 years of related experience
  • Possess expert knowledge of cybersecurity incident response lifecycle.

Responsibilities

  • Oversee and coordinate the end-to-end cybersecurity incident response lifecycle, including preparation, identification, containment, eradication, recovery, and lessons learned.
  • Analyze and prioritize security incidents escalated from Tier 1 SOC analysts, ensuring timely and effective response to mitigate risks.
  • Create, update, and maintain incident response playbooks, standard operating procedures (SOPs), and workflows to ensure consistency and efficiency in handling incidents.
  • Coordinate Response Activities: Collaborate with cross-functional teams (e.g., IT, legal, compliance, and external stakeholders) during incident response to ensure alignment and effective resolution.
  • Collect, review, and interpret threat intelligence from internal and external sources (e.g., open-source intelligence, commercial feeds, or industry reports) to identify potential threats and vulnerabilities.
  • Communicate relevant threat intelligence findings to Tier 1 and Tier 3 teams, as well as other stakeholders, to improve situational awareness and preparedness.
  • Use forensic tools and techniques to collect and preserve evidence, ensuring chain of custody for potential legal or regulatory purposes.
  • Leverage Security Information and Event Management (SIEM) systems and other tools to correlate events and identify patterns of malicious activity.
  • Serve as the primary point of contact for the organization’s Cybersecurity Incident Response Capability, ensuring the team is prepared to handle incidents effectively.
  • Guide and mentor Tier 1 and Tier 2 analysts, providing training on incident response techniques, tools, and best practices.
  • Continuously assess and enhance the CSIRC’s capabilities, including tools, processes, and team readiness, to address evolving threats.

Preferred Qualifications

  • ELK Stack (Elasticsearch, Logstash, Kibana)