Security Operations Center Engineer (Tier II)

Location: Laurel, MD
ApplyLogic is a fast-growing Veteran-Owned consulting firm, headquartered in Dunn Loring, VA. Our people are our greatest asset and our company culture is grounded on that belief. We offer challenging and interesting work in a friendly and supportive environment. We deliver best-in-class technical expertise to the Federal Government market through IT professional service contracts. 

We offer a competitive salary with a robust Fortune 500 type benefits package: employee assistance, employee adoption, 401K with match, medical, dental, vision, life, short-term and long-term disability, 15 paid time days off, 10 holidays, unlimited web-based training and up to $5K towards continuing education and/or professional development and more!
 
Founded in 2004, ApplyLogic is a Veteran Owned Small Business, ISO9001:2015 certified with over $7M annual revenues and 35 employees. Our growth has been recognized in the Washington Technology Fast 50 and the INC. 5000. We have an immediate Security Operations Center Engineer (Tier II) position available in Laurel, MD.

Job Description and Responsibilities:

The Security Operations Center Engineer will work with alerts from the Tier 1 SOC Analysts, to perform in depth analysis and triage of network security threat activity based on computer and media forensics, malicious code analysis, and protocol analysis.
  • Assist with the development of incident response plans, workflows, and SOPs
  • Deploy and maintain security sensors and tools
  • Monitor security sensors and review logs to identify intrusions
  • Think critically and creatively while analyzing security events, network traffic, and logs to engineer new detection methods
  • Work directly with cyber threat intelligence analysts to convert intelligence into useful detection
  • Collaborate with incident response team to rapidly build detection rules and signatures as needed
  • Identify incident root cause and take proactive mitigation steps
  • Perform lessons learned activities
  • Mentor junior analysts and run brown bag training sessions
  • Review vulnerabilities and track resolution
  • Review and process threat intel reports and sources
  • Develop and implement detection use cases
  • Develop and implement IDS signatures
  • Assist with incident response efforts
  • Create and brief customer reports
  • Participate in on-call rotation for after-hours security and/or engineering issues
  • Perform customer security assessments
  • Develop and run table top exercises
 
Requirements:
 
  • Fuse locally derived and externally sourced cyber threat intelligence into signatures, detection techniques, and analytic use cases intended to detect and track the advanced threat
  • Understanding of root causes of malware infections and proactive mitigation
  • Understanding of lateral movement and footholds
  • Understanding of data exfiltration techniques. Experience with critical thinking, problem solving, and analytic concepts.
  • Enjoy analyzing patterns looking for outliers
  • Have real world experience analyzing complex attacks and understand TTPs of threat actors
  • Define relationships between seemingly unrelated events through deductive reasoning
  • Experience in network/host based intrusion analysis, malware analysis, forensics, and cyber threat intel
  • Knowledge of advanced threat actors and complex attacks
  • Possess excellent writing skills and the ability to communicate to technical and executive level staff
  • Quick study with new tools
  • Knowledge of Splunk & ELK
 
Required Skills:
 
  • Practiced knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS)
  • Good technical understanding of operating systems, network architecture and design, Active Directory (AD) application log consumables, systems design as well as superior knowledge of technical operations process and procedures
  • Knowledge of encryption, key management and cryptology
  • Familiarity with the Risk Management Framework (NIST 800-37), Security Controls as described in NIST 800- 35, and the Federal Information Security Modernization Act (FISMA) operating standards and applicable guidelines
  • Experience with performing threat modelling, risk analysis, root cause analysis, risk identification, and risk mitigation
  • Experience planning and implementing secure networking practices such as: application segmentation, network segmentation, NAC and other access control testing/validation, updating access control SOPs
  • Ability to configure and develop an enterprise SIEM solution including signature tuning, development of correlation rules, reports, and alarms
  • Familiarity with a variety of web application protocols, web services (components including JavaScript, XML, JSON), scripting capabilities (Power shell, Python) software development frameworks, operating systems, and networking technologies. Understanding of various web application frameworks such as ASP.NET, J2EE
  
Education and Certifications
  • Bachelor’s Degree and 10 years of experience
  • Preferred certifications
    • Certified Computer Security Incident Handler (CSIH)
    • Electronic Commerce Council Certified Ethical Hacker (CEH)
    • GIAC Information Security Fundamentals (GISF)
    • ISC2 Certified Information System Security Professional (CISSP)
 
Clearance:
  • U.S. Citizenship
  • Public Trust, or must be able to obtain a Public Trust clearance
this job portal is powered by CATS
ApplyLogic is an equal opportunity employer. The Equal Employment Opportunity Policy of ApplyLogic is to provide a fair and equal employment opportunity for all associates and job applicants regardless of race, color, religion, national origin, gender, sexual orientation, age, marital status or disability. ApplyLogic hires and promotes individuals solely on the basis of their qualifications for the job to be filled. ApplyLogic believes that associates should be provided with a working environment which enables each associate to be productive and to work to the best of his or her ability. We do not condone or tolerate an atmosphere of intimidation or harassment based on race, color, religion, national origin, gender, sexual orientation, age, marital status or disability.