Federal - Tier 2 SOC Analyst

Accenture   •  

Greenbelt, MD

Industry: Business Services


11 - 15 years

Posted 60 days ago

This job is no longer available.

Accenture Federal Services, a wholly owned subsidiary of Accenture LLP, is a U.S. company with offices in Arlington, Virginia. Accenture's federal business has served every cabinet-level department and 30 of the largest federal organizations. Accenture Federal Services transforms bold ideas into breakthrough outcomes for clients at defense, intelligence, public safety, civilian and military health organizations.

We believe that great outcomes are everything. It's what drives us to turn bold ideas into breakthrough solutions. By combining digital technologies with what works across the world's leading businesses, we use agile approaches to help clients solve their toughest problems fast—the first time. So you can deliver what matters most.

Count on us to help you embrace new ways of working, building for change and put customers at the core. A wholly owned subsidiary of Accenture, we bring over 30 years of experience serving the federal government, including every cabinet-level department. Our 7,200 dedicated colleagues and change makers work with our clients at the heart of the nation's priorities in defense, intel, public safety, health and civilian to help you make a difference for the people you employ, serve and protect.

The Tier 2 Cyber SOC Analyst will conduct network analysis of targets, operate daily open source research (OSR) missions, resulting in various reports and alerts, and possesses extensive knowledge on network, endpoint, threat intelligence, as well as the functioning of specific applications or underlying IT infrastructure, and has some experience with forensics tools, malware analysis, closely involved in developing, tuning and implementing threat detection analytics. They will also be responsible for the following:

· Work with alerts from the Tier 1 SOC Analysts, to perform in-depth analysis and triage of network security threat activity based on computer and media forensics, malicious code analysis, and protocol analysis

· Assist with the development of incident response plans, workflows, and SOPs

· Deploy and maintain security sensors and tools

· Monitor security sensors and review logs to identify intrusions

· Work directly with cyber threat intelligence analysts to convert intelligence into useful detection

· Collaborate with the incident response team to rapidly build detection rules and signatures as needed

· Identify incident root cause and take proactive mitigation steps

· Review vulnerabilities and track resolution

· Review and process threat intel reports and sources

· Develop and implement detection use cases

· Develop and implement IDS signatures

· Assist with incident response efforts

· Create and brief customer reports

· Participate in on-call rotation for after-hours security and/or engineering issues

· Perform customer security assessments

· Develop and run table top exercises

Accenture Carnival

Carnival Corporation reimagines guest experiences with high-touch tech.

Read More


Required Qualifications:

  • Bachelor's Degree or 4 additional years of experience
  • 10 years of total IT or related experience
  • 4 years of experience working in a Security Operations Center/SOC environment as a Tier 1 or 2 analyst or equivalent (i.e. penetration testing)
  • 2 year or more of Splunk user experience including creating reports, running queries, defining correlation searches

Preferred Qualifications:

  • At least one security certification such as GCIA, GCIH, CEH
  • Understanding of root causes of malware infections and proactive mitigation
  • Understanding of lateral movement and footholds
  • Understanding of data exfiltration techniques. Experience with critical thinking, problem-solving, and analytic concepts.
  • Real world experience analyzing complex attacks and understand TTPs of threat actors
  • Define relationships between seemingly unrelated events through deductive reasoning
  • Experience in network/host-based intrusion analysis, malware analysis, forensics, and cyber threat intel
  • Knowledge of advanced threat actors and complex attacks
  • Practiced knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS)
  • Good technical understanding of operating systems, network architecture and design, Active Directory (AD) application log consumables, systems design as well as superior knowledge of technical operations process and procedures
  • Knowledge of encryption, key management and cryptology
  • Familiarity with the Risk Management Framework (NIST 800-37), Security Controls as described in NIST 800- 35, and the Federal Information Security Modernization Act (FISMA) operating standards and applicable guidelines
  • Experience with performing threat modeling, risk analysis, root cause analysis, risk identification, and risk mitigation
  • Experience planning and implementing secure networking practices such as: application segmentation, network segmentation, NAC and other access control testing/validation, updating access control SOPs
  • Ability to configure and develop an enterprise SIEM solution including signature tuning, development of correlation rules, reports, and alarms
  • Familiarity with a variety of web application protocols, web services (components including JavaScript, XML, JSON), scripting capabilities (Power shell, Python) software development frameworks, operating systems, and networking technologies. Understanding of various web application frameworks such as ASP.NET, J2EE