Department of Homeland Security (DHS), Security Operations
Center (SOC) Support Services is a US Government program responsible to
monitor, detect, analyze, mitigate, and respond to cyber threats and
adversarial activity on the DHS Enterprise. The DHS SOC has primary
responsibility for monitoring and responding to security events and incidents
detected at the Trusted Internet Connection (TIC) and Policy Enforcement Point
(PEP) and is responsible for directing and coordinating detection and response
activities performed by each Component SOC. Direction and coordination are
achieved through a new shared DHS incident tracking system and other means of
coordination and communication.JOB SUMMARY:
The Security Operations Center (SOC) Metrics Analyst Mid-Level will work directly with the SOC Metrics Team Lead and the customer to ensure that effective, measurable Cyber metrics are collected, analyzed, and presented on both and ad hoc and continual basis using the existing infrastructure. The candidate will be responsible for implementing SOC metrics program to ensure the metrics collected are impactful, and assist in driving sound management decisions. The candidate must have a strong background as a Sr. Cybersecurity Analyst supporting 24X7 operations with experience in data security technologies, incident response, forensics, and digital media analysis and process improvement. The candidate should be familiar the Cyber Kill Chain methodology and how to correctly measure its effectiveness.
Propose SOC metrics for government approval.
Develop a set of SOC metrics that indicate ESOC and Enterprise SOC staff awareness of the Kill Chain methodology.
Develop Implementation Metrics that demonstrate enterprise SOCs are actively using Kill Chain methodology. Develop effectiveness and efficiency SOC metrics
Develop Impact Metrics demonstrating the maturity of enterprise SOCs
Develop a metrics scorecard to display the level of effectiveness of enterprise SOCs
Build dashboards using the ESOC infrastructure to support on-demand metrics representation
The candidate must currently possess or be able to obtain a DHS EOD and be eligible for Top Secret/SCI. Familiar with the management, operational, and technical aspects of IT Security in a complex enterprise environment. Experience operating at a Sr. Analyst in a 24x7 security operations center (SOC) in the areas of Digital Media Analysis, Forensics, Incident Response, or malware reverse engineering.
BS in IT related field or higher and 3+ years' experience in Digital Media Analysis, Forensics, Incident Response, malware reverse engineering, or cyber intelligence. Skills in: SQL
and Tableau, Excel and Microsoft Suite.Experience with
Business Intelligence (BI), Visualization, and Reporting tools, such as Power
BI, Tableau, and/or Qlik.
with maintaining, integrating, and preparing complex and/or large datasets for
Familiarity Splunk and its dashboard capabilities
- Familiarity with Cyber Kill Chain methodology
External Referral Bonus:
Potential for Telework:
Clearance Level Required:
Scheduled Weekly Hours: