SOC Analyst - Fairfax, United States - CGI Group, Inc.

CGI Group, Inc.
CGI Group, Inc.
Verified Company
Fairfax, United States

3 weeks ago

Mark Lane

Posted by:

Mark Lane

beBee recruiter


Description
SOC Analyst (Mid) - U.S. Citizenship Required

Position Description


CGI is one of the top 5 largest global IT companies spread across 40 countries with endless opportunities to expand and grow.

As a CGI Federal Member, you have the opportunity to be a shareholder at CGI and join a family of 90,000 members strong.


CGI Federal is hiring a SOC Analyst (Mid) to work with a skilled and motivated team of professionals on a high-visibility Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) cyber security program.

You will support a dynamic, fast-paced project focused on improving the cyber security posture of civilian government agencies through the implementation and enhancement of a cybersecurity platform, providing integration services, and developing, securing and maintaining cybersecurity dashboards.

You will work closely with a variety of agency stakeholders, supporting their mission, priorities, organization, and unique challenges. You will also support the development of additional cyber security offerings focused on next generation security solutions and technologies.

Qualified applicants will be on the forefront of incident response where they will utilize the latest in network security technology to provide Computer Network Defense and Information Assurance (IA) support to CGI Federal and its customers.

This position is located in our Fairfax, VA office; however, a hybrid working model is acceptable.

You will be required to be in our Fairfax, VA office two days per week.

Your future duties and responsibilities

  • Understand and maintain the appropriate knowledge of tools, security procedures, and services within the SOC
  • Ensure that event analysis and incident reports are documented, and quality control is applied to ensure accuracy
  • Assist in developing and maturing the current and future services and capabilities of the SOC, such as Forensics, Threat Management, Penetration Assessments, and Tool Management
  • Identify improvements within processes, procedures, policies, staffing, training, and tools to improve efforts and daily operations
  • Ensure that all procedures and operations are carried out as tasked
  • Responsible for shift activity logging and daily operations in terms of making sure that daily shift responsibilities are completed
  • Understand and contribute to the improvement and direction of SOC objectives, direction, and procedures
  • Maintain the ability to complete all SOC daily operations and procedures and ensure the proper escalation and leadership knowledge is provided
  • Ensure the proper documentation of tickets, shift documentation, correspondence, and escalations
  • Ensure events are handled at detection time according to established procedures
  • Demonstrate excellent communication and client care skills by documenting all activities within our client delivery systems and communicating with client representatives in a timely manner
  • Stay informed of current events in the security industry including the latest exploits and threats as well as preventative measures, remediating, and restoration techniques
  • Act as the escalation point for client requests for information and presence
  • Assist analyst investigation and ticket creation efforts. Provide daily monitoring and alerting of events that occur within the near real time environment.
  • Ensure the proper mitigations and vulnerability management are recommended and escalated to management.
Required qualifications to be successful in this role

  • Bachelor's degree in Computer Science or related discipline and 35 years of experience of directly related practical experience and demonstrated ability to carry out the functions of the job
  • Experience working in an IT Security Operations Center using SANS methodology
  • Experience and knowledge of Security Information Event Management
  • Experience in Intrusion Detection or Prevention Systems
  • Knowledge of: TCP/IP, computer networking, routing, and switching
  • Experience in Linux/UNIX and Windows based devices at the System Administrator level
  • System log forensics (Syslog, Event Viewer)
  • Strong troubleshooting, reasoning, and problemsolving skills
  • Team player, excellent communication skills, and good time management skills
  • Organizational skills and the ability to work autonomously with attention to processes
  • Ability to speak and communicate effectively with peers, management, and clients
  • Ability and experience in writing clear and concise technical documentation
  • Ability to speak and write fluently in English

Desired qualifications/non-essential skills required:

  • SIEM experience (ArcSight, QRadar, Splunk)
  • Experience using ticketing systems such as Remedy, LanDesk, ServiceNow
  • Security+, Network+, CISSP, CEH, GCIA, GCIH, CISM, or Splunk training highly valued
  • Knowledge of: Strong Authentication, End Point Security, Internet Policy Enforcement, Firewalls, Web Content Filtering, Database Activity Monitoring (DAM), Public Key

More jobs from CGI Group, Inc.