Department of Homeland Security (DHS), Security Operations Center (SOC) Support Services is a US Government program responsible to monitor, detect, analyze, mitigate, and respond to cyber threats and adversarial activity on the DHS Enterprise. The DHS SOC has primary responsibility for monitoring and responding to security events and incidents detected at the Trusted Internet Connection (TIC) and Policy Enforcement Point (PEP) and is responsible for directing and coordinating detection and response activities performed by each Component SOC. Direction and coordination are achieved through a new shared DHS incident tracking system and other means of coordination and communication.
Job Summary: The Security Operations Center (SOC) Sr. Metrics Analyst will work directly with the SOC Metrics Team Lead and the customer to ensure that effective, measurable Cyber metrics are collected, analyzed, and presented on both and ad hoc and continual basis using the existing infrastructure. The candidate will be responsible for implementing SOC metrics program to ensure the metrics collected are impactful, and assist in driving sound management decisions. The candidate must have a strong background as a Sr. Cybersecurity Analyst supporting 24X7 operations with experience in data security technologies, incident response, forensics, and digital media analysis and process improvement. The candidate should be familiar the Cyber Kill Chain methodology and how to correctly measure its effectiveness.
Primary Responsibilities: Propose SOC metrics for government approval. Develop a set of SOC metrics that indicate ESOC and Enterprise SOC staff awareness of the Kill Chain methodology. Develop Implementation Metrics that demonstrate enterprise SOCs are actively using Kill Chain methodology. Develop effectiveness and efficiency SOC metrics. Develop Impact Metrics demonstrating the maturity of enterprise SOCs. Develop a metrics scorecard to display the level of effectiveness of enterprise SOCs. Build dashboards using the ESOC infrastructure to support on-demand metrics representation
The candidate must currently possess or be able to obtain a DHS EOD and be eligible for Top Secret/SCI. Familiar with the management, operational, and technical aspects of IT Security in a complex enterprise environment. Experience operating at a Sr.Analyst in a 24x7 security operations center (SOC) in the areas of Digital Media Analysis, Forensics, Incident Response, or malware reverse engineering.
BS in Computer Science or Information Systems, Industrial Engineering, Business Administration, Business Analysis, Math/Accounting/Finance or related field and 8+ years of work experience in the following areas: designing and producing metrics, KPIs, and data visualizations, creating interactive metrics dashboards using Power BI, Tableau or other data visualization tools, generating reports, charts, and graphs. Advanced level proficiency in Microsoft Excel: ability to write and update complex formulas, build macros, and present numerical data in visual formats such as charts and pivot tables and ability to create presentations and reports. Advanced level proficiency in BI/Data Visualization Tools: ability to write and update existing queries, develop/import data from external sources, develop and generate other objects such as forms and reports. Extensive experience with data requirements, architecture, design, development, deployment, and resource management methodologies and best p ractices. Significant experience with maintaining, integrating, and preparing complex large data sources and querying/integrating data from databases. High degree of knowledge of the Data and Analytics functional and technical competencies (Business Process, Data Flow, Data Architecture, Technical Design, Development Processes, Code Deployment, Load Testing, DevOps, etc).
Ability to work in a fast paced, demanding, and fluid environment. Strong problem solving and analytical skills. Strong organization skills and attention to detail. Exceptional interpersonal skills and written communication skills to frequently interact with all levels of the organization. Familiarity with Splunk and its dashboard capabilities. Familiarity with Cyber Kill Chain methodology.