CIRT Analyst

  • Full-time

Company Description

RP Pro Services is a rapidly growing Technology consulting firm headquartered in Virginia. We’re a Service-Disabled Veteran-Owned Small Business (SDVOSB) serving both federal and commercial customers. At RP Pro Services, we help our clients achieve their mission by developing value driven, customized solutions that are executed by the best people. Our dedication to our employees and clients is driven by our promise to deliver Excellence, Value, and Flexibility. "People, not just Resources" is more than our motto; it's the foundation on which we are built!

Job Description

RP Pro Services is hiring a SOC (Security Operations Center) Analyst for a Federal customer located in Washington DC. We’re looking for a junior to mid-level Analyst on a newly awarded federal SOC/Incident Response contract. As the SOC Analyst, you will work on the client site to create and maintain a secure computing environment. You will be responsible for utilizing various SIEM tool to analyze and detect the presence of various cyber threats. Beyond identifying threats, you will also be responsible for documenting and supporting the effort to neutralize the threats. This will include responding to tickets, leveraging existing tools to analyze the various threats, and escalating active threats in order to get them resolved.

The work location is Washington, DC, and you be working in a 24x7 SOC environment on rotating a 12-hour shift.

Your Responsibilities:

  • You’ll use SIEM technologies and other native tools to monitor security events.
  • You’ll perform analysis on logs produced by network devices ranging from firewalls to IDS tools to Email logs
  • You’ll utilize Intel/McAfee SIEM to monitor the network and perform analysis; while leveraging the results to proactively protect the enterprise
  • You’ll provide security events analysis and support to include identifying potential threat, anomalies, and infections, documenting findings, providing recommendations within the enterprise incident management system
  • You’ll perform technical analyses of malicious code, network traffic, web log data, cyber intelligence, hard drives, and other storage and forensics media
  • You’ll manage inbound requests via the OCC ticketing system (Service Now), as well as via telephone calls, and provide security notifications
  • You’ll be responsible for escalating the threats for appropriate actions within a targeted response time set forth by the client


Qualifications

Your Required Qualification:

  • US Citizenship
  • Ability to get a Public Trust
  • Bachelor’s degree
  • At least 1 year of SOC experience
  • Experience with the following (or similar) tools: McAfee Nitro SIEM, McAfee IDS/IPS, Imperva web application firewalls, McAfee Enterprise Antivirus, BlueCoat, Symantec DLP, Mandiant/Fireeye, Guardian MDB Protect, Cisco firewalls, QualysGuard, AppScan
  • Excellent written and oral communications skills

Nice to have:

  • One or more of the following: CISSP, CCE, CCFE, GCIH, GCFE, GCFA, GREM, GPEN, GWAPT, GXPN

The Buzzwords:

  • SOC – Security Operations Center
  • Incident Response
  • SIEM
  • Cyber Security
  • Cyber Forensics

Additional Information

All your information will be kept confidential according to EEO guidelines.