Back to Search Results
Get alerts for jobs like this Get jobs like this tweeted to you
Company: SAIC
Location: Atlanta, GA
Career Level: Associate
Industries: Technology, Software, IT, Electronics

Description

Description

SAIC is seeking a Junior SOC Analyst in Atlanta, GA.  This is in support of the Department of Health and Human Services (HHS) cybersecurity mission to ensure HHS can actively protect the vital health information with which it is entrusted, respond to existing and emerging cybersecurity threats, and continue to enhance the program to ensure HHS has the capability and capacity to respond to new and emerging requirements, technologies and threats.

This role is 100% on-site in Atlanta, GA. Must be open to working either 1st, 2nd or 3rd shift based on the needs of the contract:

  • 1st Shift: 7:00 AM - 5:00 PM
  • 2nd Shift: 3:00 PM - 1:00 AM
  • 3rd Shift: 9:00 PM - 7:00 AM

SOC Activities:

  • Collect, analyze, and correlate security events and use discovered data to enable recommendation of mitigation of potential incidents within the enterprise as defined by Computer Security Incident Response Center (CSIRC) methodology.
  • Identify events that pose a threat to the confidentiality, availability and integrity of information or systems that may be indicative of a violation of federal law or HHS Policy.
  • Perform incident triage to include determining accuracy, scope, urgency, and impact.
  • Provide incident coordination and updates to the OpDiv Incident Response Teams (IRTs) and HHS through prescribed CSIRC methodology.
  • Notify CSIRC management and other HHS IRT members of suspected incidents and articulate the event's history, status and potential impact.
  • Perform agency-wide event and incident tracking using ticket management system.
  • Track and report on-going cyber security incidents to the primary incident handler.
  • Respond to verified incidents utilizing a wide array of tools to mitigate active threats.
  • Make required outage and degradation notifications to stakeholders at intervals commemorate with problem severity. 
  • Take part in structured tabletop exercises to simulate security incidents and contribute to the development of standardized response protocols. 

Qualifications

Required Education and Experience:

  • Bachelor's degree in Computer Science, Information Systems, Engineering or related field and 0-1+ years of experience or 4 years of experience in lieu of a degree. Must have the adequate knowledge and skills to learn and perform the described job.
  • Must have experience using investigative tools such as Splunk, NetWitness, or other industry-recognized SIEM platforms. 
  • Must have 1 year of cybersecurity experience or relevant education/training in the cybersecurity field, preferably with a primary focus in a Security Operations Center (SOC) environment. 
  • There are 3 shifts, 10 hours each. Must be open to working 1st, 2nd, or 3rd shift (4-10 schedule)

Certification Requirement:

  • An industry-standard cybersecurity certification e.g., Security+, CySA+, GCIA, GSOC, Splunk, or a similar credential is highly preferred. 

Clearance Requirement:

  • Must be a U.S. Citizen with the ability to obtain and maintain a Public Trust clearance.

 

 

 

 


Covid Policy: SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site.


 Apply on company website