Negotiable
Outside
Remote
USA
Summary: This role involves working as a Security Operations Center (SOC) Analyst with the National Incident and Response Team (NIRT) of the Federal Reserve System. The position requires reviewing data to identify anomalies and conducting investigations during evening/overnight shifts. The candidate will work three consecutive 12-hour shifts per week, typically starting at 7 or 8 pm. The role demands a combination of educational qualifications and experience in security across various platforms and technologies.
Key Responsibilities:
- Review data to identify anomalies requiring further investigation.
- Work evening/overnight shifts, typically starting at 7 or 8 pm.
- Perform security event triage and analysis.
- Respond to various attack vectors including data exfiltration, DDoS, malware, insider risk, and phishing.
- Analyze large data sets and unstructured data to identify trends and anomalies.
- Utilize SIEM tools to analyze security events from multiple sources.
- Maintain knowledge of current security threats and techniques.
- Collaborate with another resource from the NIRT during shifts.
Key Skills:
- Bachelor's degree in Computer Science or related discipline (preferred).
- 0-2 years of experience in security aspects of multiple platforms.
- Ability to obtain and maintain National Security Clearance.
- Experience with SIEM and analyzing security events.
- Knowledge of TCP/IP protocol and network/packet analysis.
- Understanding of current security threats and landscape.
- Experience with IT Infrastructure designs and technologies.
Salary (Rate): undetermined
City: undetermined
Country: USA
Working Arrangements: remote
IR35 Status: outside IR35
Seniority Level: undetermined
Industry: IT
Role: NIRT SOC Analyst
Location: Remote.
Description:
This role will work with the National Incident and Response Team (NIRT) of the Federal Reserve System as a Security Operations Center (SOC) Analyst.
This candidate will review data and help identify anomalies that require further investigation.
This is an evening/overnight shift that typically begins 7 or 8 pm until the shift handover in the morning.
The candidate will work (3) 12-hour shifts a week on consecutive days (though days may shift to ensure team coverage from time to time).
This resource will generally be on duty with one other resource from the NIRT during their shift
Quals/Responsibilities:
BS 0-2 Years or HS 6-8.
Bachelor's degree in Computer Science or a related discipline (preferred) and experience in security aspects of multiple platforms, operating systems, software, communications and network protocols or an equivalent combination of education and work experience.
Ability to obtain and maintain National Security Clearance, including ship.
Security platform and technology capabilities; SIEM utilization skills with the ability to analyze security events from multiple monitoring and logging sources to identify and/or confirm suspicious activity.
Ability to analyze large data sets and unstructured data to identify trends and anomalies indicative of malicious activity.
Knowledge of, and experience with, TCP/IP protocol and network/packet analysis.
Knowledge of current security threats, techniques, and landscape, and a dedicated desire to research current information security landscape.
Perform security event triage and analysis with knowledge in current security threats and techniques.
Respond to different attack vectors such as data exfiltration, DDoS, malware, insider risk, and phishing.
Experience with IT Infrastructure designs, technologies, products, and services. This should include knowledge of networking protocols, firewall functionality, host and network intrusion detection systems, operating systems, databases, encryption, load balancing, and other technologies.