The Security Operations Center (SOC) Sr. Metrics Analyst will work directly with the SOC Metrics Team Lead and the customer to ensure that effective, measurable Cyber metrics are collected, analyzed, and presented on both and ad hoc and continual basis using the existing infrastructure. The candidate will be responsible for implementing SOC metrics program to ensure the metrics collected are impactful, and assist in driving sound management decisions. The candidate must have a strong background as a Sr. Cybersecurity Analyst supporting 24X7 operations with experience in data security technologies, incident response, forensics, and digital media analysis and process improvement. The candidate should be familiar the Cyber Kill Chain methodology and how to correctly measure its effectiveness.
The candidate must currently possess or be able to obtain a DHS EOD and be eligible for Top Secret/SCI. Familiar with the management, operational, and technical aspects of IT Security in a complex enterprise environment. Experience operating at a Sr. Analyst in a 24x7 security operations center (SOC) in the areas of Digital Media Analysis, Forensics, Incident Response, or malware reverse engineering.
BS in IT related field or higher and 5+ years’ experience in Digital Media Analysis, Forensics, Incident Response, malware reverse engineering, or cyber intelligence. 7 years of Digital Media Analysis, Forensics, Incident Response, malware reverse engineering, or cyber intelligence experience qualifies in place of degree.
Sr. Level security certification is required, e.g. CISSP, GCIH
- Familiarity Splunk and its dashboard capabilities
- Familiarity with Cyber Kill Chain methodology
- Experience as a SOC Sr. Manager