Home
/
Comprehensive
/
Secret Cleared Tier 2 SOC Analyst (Clearance Required)
Secret Cleared Tier 2 SOC Analyst (Clearance Required)-April 2024
Richmond
Apr 19, 2025
ABOUT DELOITTE
With more than 100,000 Deloitte professionals across the United States, our range of services and depth of resources create the potential to make an impact through most any career. Right now, our prof
10,000+ employees
Consulting, Financial Services
VIEW COMPANY PROFILE >>
About Secret Cleared Tier 2 SOC Analyst (Clearance Required)

  Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS Cyber Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber minded culture and become stronger, faster, and more innovative. You will become part of a team that advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security. Our dynamic team offers opportunities to work with cutting-edge cyber security tools and grow both vertically and horizontally at an accelerated rate. Join our cyber team and elevate your career.

  The team Deloitte's Government and Public Services (GPS) practice - our people, ideas, technology and outcomes-is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of more than 15,000 professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.

  At Deloitte, we believe cyber is about starting things-not stopping them-and enabling the freedom to create a more secure future. Cyber Strategy, Defense and Response (SDR) focuses on helping federal clients design and implement transformational enterprise security programs with an emphasis on defending against, recovering from, and mitigating major cyberattacks. If you're seeking a career that increases cyber awareness, utilizes risk management programs, and develops strategies for cyber defense and response, then the Cyber SDR offering at Deloitte is for you.

  Work You'll Do The Mid Security Analyst will monitor and analyze security events and alerts reported by the TSA SIEM on a 24x7x365 basis to identify and investigate suspicious or malicious activity, or other cyber events which violate TSA policy. The analyst will be responsible for analyzing logs and events from any other device types which may send logs or events to the TSA SOC in the future. Non-traditional device feeds will deliver data to the SIEM architecture (e.g., Human Resources (HR) data, badging information, and physical security devices, etc.). The analyst will provide documentation detailing any additional information collected and maintained for each security investigation. The analyst will record all artifacts (i.e. emails, logs, documents, Uniform Resource Locators (URLs), screenshots, etc.) associated with all security events and incident investigations within the TSA SOC incident and tracking application.

  To support the 24x7x365 requirements of cyber operations there are four (4) available shift schedules: Shift 1 - Sun, Mon, Tue - 6 AM to 6 PM Shift 2 - Sun, Mon, Tue - 6 PM to 6 AM Shift 3 - Thu, Fri, Sat - 6 AM to 6 PM Shift 4 - Thu, Fri, Say - 6 PM to 6 AM The morning/evening shifts will rotate personnel every other Wed to work 8 hours which will equal 80 hours over 2 weeks.

  Required skills:

  Minimum Bachelor's Degree or equivalent experience required

  Active Secret security clearance required

  3 to 5 years of experience working in a Security Operations Center (SOC) or Network Operations Center (NOC) environment performing security event monitoring and analysis

  To support the 24x7x365 requirements of cyber operations there are four (4) available shift schedules:

  Shift 1 - Sun, Mon, Tue - 6 AM to 6 PM

  Shift 2 - Sun, Mon, Tue - 6 PM to 6 AM

  Shift 3 - Thu, Fri, Sat - 6 AM to 6 PM

  Shift 4 - Thu, Fri, Say - 6 PM to 6 AM

  The morning/evening shifts will rotate personnel every other Wed to work 8 hours which will equal 80 hours over 2 weeks.

  Working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks.

  Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.)

  Must be capable of analyzing security logs and events from the following types of devices such as, but not limited to: Firewalls (FWs), Intrusion Detection Sensors/Intrusion Prevention Sensors (IDS/IPS), Host-based Intrusion Detection System/ Host-based Intrusion Prevention System (HIDS/HIPS), proxy/web filter, vulnerability scans, routers, router Internet Protocol (IP) accounting systems (i.e., Cisco NetFlow), Virtual Private Network (VPN) gateways/concentrators, server event logs, e-mail and host anti-virus, desktop security monitoring agents, anti-virus servers, IP services (i.e. Domain Name System (DNS) Services, Dynamic Host Configuration Protocol (DHCP), network address translation devices, MDM (e.g. cellphones), Public Key Infrastructure (PKI), and cloud security infrastructure (e.g. Amazon Web Services (AWS), Azure, Oracle, Salesforce, etc.)

  Familiarity with adversarial tactics, techniques, and procedures (TTPs)

  Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future

  Preferred Skills:

  Certification: Security+, GIAC Security Essentials (GSEC) or equivalent certification is desired

  Ability and prior experience with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents. This includes the identification of malicious code present within a computer system as well identification of malicious activities that are present within a computer system and/or enterprise network

  Experience with Splunk query language

  Experience with IDS/IPS/firewall/security configurations and signature development

  Experience with PCAP analysis

  Experience with Tanium threat response

  Experience working with a ticket management system to collect, document and maintain information pertinent to security investigations and incidents

  Excellent verbal and written communications skills and ability produce clear and thorough security incident reports and briefings

  Experience in monitoring the operational status of monitoring components and escalating and reporting outages of the components

  Conceptual understanding of Windows Active Directory is also desired

  Experience working with various event logging systems and must be proficient in the review of security event log analysis. Previous experience with SIEM platforms that perform log collection, analysis, correlation, and alerting is also preferred

  Experience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment

  Experience in collecting and maintaining information pertinent to security; investigations and incidents in a format that supports analysis, situational awareness reporting, and law enforcement investigation efforts

  #IND:G

  #LI-RH1

  All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.

Comments
Welcome to zdrecruit comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Show More Comments
SIMILAR JOBS
Phlebotomist
Do you want to join an international team working to improve the future of healthcare? Do you want to improve the lives of millions of people? Grifols is a global healthcare company which, since its f
Explosive Detection K9 Handler
MSA Security®, An Allied Universal® Company, is a leading global provider of high consequence threat solutions. We offer customized and innovative security solutions developed and executed by a team o
K9 Handler - Explosive Detection
MSA Security®, An Allied Universal® Company, is a leading global provider of high consequence threat solutions. We offer customized and innovative security solutions developed and executed by a team o
Family Advocate
Are you a socially conscious, dedicated individual who is committed to building a better future for children, families, and their communities? If so, join us as we support early childhood education pr
NP/PA EXTERN-Nelson
Miranda Nelson Miranda Nelson Job: *Please select a valid job field Organization: *Marquette Family Med Phys Prac Title: NP/PA EXTERN-Nelson Location: Michigan-Marquette Requisition ID: 7467-9465 ...
Senior Manager, Product Management - Auto Finance
Plano 7 (31067), United States of America, Plano, Texas Senior Manager, Product Management - Auto Finance Product Management Product Management at Capital One is a booming, vibrant craft that requires
Registered Dietitian I (On-Call)
Job Summary: Responsible for providing clinical nutrition care and services to patients/clients in response to protocol and physicians orders to include the following: Assessment of Patients nutrition
Senior Lead Software Engineer, Full Stack (The Capital One Lab)
Center 3 (19075), United States of America, McLean, Virginia Senior Lead Software Engineer, Full Stack (The Capital One Lab) Do you love building and pioneering in the technology space? Do you enjoy s
Security Officer - Full Time
Security Officer We’re looking for qualified Security Officer to join our Texas Health family. Is that you? Work location: Texas Health Plano, 6200 W Parker Road, Plano TX 75093 Work hours: Full Time,
Infrastructure Construction Quality Control Lead
At Fluor, we are proud to design and build projects and careers. This requires teams that are as unique as the projects we execute. We are committed to fostering a work environment that embraces Diver
Copyright 2023-2025 - www.zdrecruit.com All Rights Reserved