Everforth ECS is seeking a
Senior SOC Chief to work in our
Washington DC office.
Everforth ECS Federal is a leading information security and information technology company in Washington, DC. We are looking to hire a Senior Security Operation Center (SOC) Manager to provide a full range of cybersecurity services on a long-term contract in Suitland, MD. The position is full time/permanent and will provide 24x7x365 support for a US Government civilian agency. The position is available immediately upon finding a qualified candidate with the appropriate background clearance.
Top Secret, SCI eligible
- 8+ years of Information Technology experience, with at least 5 years of experience in information security working within security operations
- 7-10+ years of experience in SOC operations and incident response including SOC management and an IR commander role.
- Experience with maturing and optimizing SOCs
- Experience with utilizing Cyber Threat Intelligence to enhance security operations, and threat detections and response
- Preferred experience with developing and deploying an integrated NOC/SOC model
- Excellent problem solving, critical thinking, and analytical skills with the ability to de-construct problems
- Strong customer service skills and decision-making skills
- Working knowledge of cloud infrastructure preferred
- Career proven knowledge and experience with log, network, and system forensic investigation techniques
- Significant experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs
- Significant experience with host and network analysis
- Experience with reading malware analysis reports
- Knowledge of diverse operating systems, networking protocols, systems administration and security technologies
- Intelligence driven defense utilizing the Cyber Kill Chain (CKC) and MITRE ATT&CK
- Significant experience monitoring threats via a SIEM console
- Candidate must have familiarity with US-CERT Federal Incident Notification Guidelines
- Azure, Azure Sentinel, Microsoft 365 Defender (across endpoint, email, and collaboration) experience preferred
- Working knowledge of FireEye/Trellix tools, Akamai WAF, Sourcefire, and Ironport
- Strong sense of professionalism and ethics
- Actively seeks to enhance the group through the sharing of knowledge
- Acts with integrity and communicates honestly and openly
- Ability to build rapport and cooperation among teams and internal stakeholders
- Respects others and demonstrates fair treatment to all
- Methodical and detail oriented
- Self-motivated
- Ability to work in a high-pressure environment with changing priorities.
Salary Range: $175,000-195,000
General Description of Benefits