This site uses cookies. To find out more, see our Cookies Policy

Security Operations Center Analyst, Mid in Bremerton, WA at Booz Allen Hamilton Inc.

Date Posted: 12/18/2018

Job Snapshot

Job Description

Job Number: R0044657

Security Operations Center Analyst, Mid

The Challenge:

Are you ready to take an active role in Cyber defense for a client?  Are you looking for an opportunity to protect critical infrastructure from the constant onslaught of Cyber attacks? If you want to sharpen your skills by analyzing threats real-time, you want to be a SOC analyst.

As an analyst on our SOC team, you’ll monitor and analyze threats, using state-of-the-art tools like HBSS, Splunk, Wireshark, Orion, and PowerShell. You’ll use your Cybersecurity skills to:

* Continuously monitor the alert queues, triage security alerts, monitor the health of security sensors and endpoints, and collect the data and context necessary to initiate incident response

* Review alerts to determine relevancy and urgency and communicate alerts to client regarding intrusions to the network's infrastructure, applications, and operating systems

* Create trouble tickets for alerts that signal an incident and require incident response review and collaborate with other teams to assess risk and develop improvement strategies for security posture

* Run vulnerability scans and review vulnerability assessment reports

* Monitor and analyze Security Information and Event Management (SIEM) and Security Event Management (SEM) for remediation of security issues as well as analyze work traffic, Intrusion Detection Systems (IDS), security events, and logs

* Advise incident responders in the steps to take to investigate and resolve computer security incidents

* Perform detailed packet capture analysis

You’ll work with the team to understand, mitigate, and respond to threats quickly, restoring operations and limiting the impact. You’ll analyze incidents to figure out just how many systems are affected and assist recovery efforts. You’ll combine threat intelligence, event data, and assessments from recent events, and identify patterns to understand attackers’ goals to stop them from succeeding. This is a great opportunity to build your Cybersecurity skills with hands on experience in threat assessment and incident response. Join us as we protect our client from malicious actors.

Empower change with us.

Build Your Career:

Rewarding work, fun challenges, and a ton of investment in our people—that’s Booz Allen Cyber. When you join Booz Allen, we’ll help you develop the career you want.

Competitions — From programming competitions at our PyNights (Python competition and learning events) to competing in CTFs, we’ve got plenty of chances for you to show off your skills.

Paid Research — Have an innovative idea to explore or hypothesis to test? You can participate in challenges via our crowd-sourcing platform, the Garage, and other programs to be awarded dedicated time and/or funding to advance your skills.

Cyber University — CyberU has more than 5000 instructor-led and self-paced Cyber courses, a free online library that you can access from just about anywhere—including your phone—and certification exam prep guides that include practical assessments to prepare you for your exam.

Academic Partnerships — In addition to our tuition reimbursement benefit, we’ve partnered with University of Maryland University College to offer two graduate certificate programs in Cybersecurity—fully funded without a tuition cap.

Maker/Hackerspaces — Race drones, print 3D gadgets, drink coffee from our Wi-Fi coffee maker, and get hands-on training on tools and tech from in-house experts in our dedicated maker and hackerspaces.

You Have:

-2+ years of experience as an information assurance specialist

-Experience with vulnerability scans

-Experience with monitoring tools, IE, HBSS, Splunk, Active Directory, Orion, and PowerShell

-Active Secret clearance

-HS diploma or GED

Nice If You Have:

-Experience with alternate scripting or programming languages, including Bash scripting, Perl, and Java

-Experience with digital forensics and malware analysis

-Experience with working as a penetration tester

-Ability to reverse engineer network or malware communication protocols allowing for the identification of infrastructure, functionality, transport methods, and decoding of control processes

-Splunk Power User or Administrator Certification


Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Secret clearance is required.

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or veteran status—to fearlessly drive change.


Your Career is Waiting.

Get job alerts. Learn about new work and upcoming events. Share open roles with friends and colleagues.
Our Talent Network is your opportunity hub.

Get Answers and Access.

Need more information? Find it in our FAQs.

Application already in-process? Log in to keep going.