Overnight SOC Analyst with Security Clearance Community, Social Services & Nonprofit - Aurora, CO at Geebo

Overnight SOC Analyst with Security Clearance

Zachary Piper Solutions is seeking a Overnight SOC Analyst to join a federal contract that is fully funded through 2026 located in Aurora, CO.
This position is in a 24/7 Cyber Security Operations Center on-site Sun-Wed or Wed-Sun from 10pm-8am.
The SOC Analyst will provide on-site support within the CSOC and assist with protection against cyber attacks.
Responsibilities for the SOC Analyst include:
Detect, identify, and report cyber attacks, analyze network traffic and data, and respond to various incidents Assist with cyber incident triage including determining the scope, urgency, and impact of threats and making recommendations on steps to remediate Track, analyze, and present cyber incidents through the whole process of identification to resolutionRequired Qualifications for the SOC Analyst include:
2-5
years of experience working in a Cyber Security Operations Center or related environment Experience with COTS technologies such as the following:
VMWare, ServiceNow, Splunk, Tanium, Tenable, and/or McAffee Experience with Windows and Linux operating systems Bachelor's Degree required Active IAT Level II Cert TS/SCI with CI PolyCompensation for the SOC Analyst include:
$100,000-130,000 depending on experience - junior-mid-senior level openings CIGNA Medical, Dental, Vision, PTO, Holidays, and 401k MatchingKeywords:
dod, d zems, Remedy, tickets, ticketing, ticket system, enterprise software, enterprise software desk, technical issues, technical, ESD, customer service, remote desk takeover, end-user, desktop support, USMC, entry, entry level, permanent, direct placement, direct hire, full time, fulltime, full-time, computer science, CCNP security, GCED< GCIH, CISA, CASP CE, CCNP, endpoint, endpoint security, Tanium, acas, hbss, analyst, it technician, cyber security analyst, cyber security specialist, iat level 3, iat level iii, iatlevel3, level 3, iat level 3, secret, active secret, cleared, clearance, secret clearance, military, veteran, marines, nist, fedramp, NIST, FedRAMP, FISMA, ISO, HIPAA, COBIT, HITECH, CISM, CISSP, 800-53 rev.
3, 800-53 rev.
4, 800-37, Security+, CAP, CISA, contingency plans, security assessment plans, SCA, security control assessment, system security plan, SSP, incident response plan, vulnerabilities, vulnerability management, POA&M, plan of action and milestones, artifact, nessus, retina, ACAS, PKI, HBSS, continuous monitoring, consulting, SA&A, A&A, C&A, certification, accreditation, information assurance, information securit, , Vulnerability, Scanning, Secret, Marines, Marine Corps, Quantico, USMCB Quantico, DoD, Navy, Army, Air Force, Quantico, VA, virginia, dmv, on-site, quantico va, patch, patching, isso, isse, issm, sca, security control assessor, Quantico, VA, Virginia, Woodbridge, Woodbridge VA, Woodbridge Virginia, Quantico VA, Quantico Virginia, DMV, District of Columbia, DC, Washington DC, Washington D.
C.
, District, the district, maryland, md, virginia, nova, northern virginia, dc area, dc local, on-site, work, cleared, cleared work, secret clearance, cleared secret, dod secret, dod secret clearance, ts, top secret, top secret clearance, tssci, ts sci, ts/sci, top secret with sci, top secret w/ sci, level of security, security investigation, federal, contract, contractor, subcontractor, prime, sub work, contract work, w2, full time, full-time, fulltime, full time work, 40 hours, 40hrs, full week, soc, security operations center, csoc, cyber security operations center, cybersecurity operations center, cybersecurity, cyber security analyst, cyber security, analyst, cyber analyst, 24x7, 24/7, shiftwork, shift work, overnight work, overnightwork, overnight, over night, springfield, spring field, springfield va, springfield va, nova, IDS, CND, IPS, CIRT, CERT, SOC, Security Analysis Threat Analysis, Threat Analyst, Incident Response, Intrusion Detection, Malware Analysis, Red Team, Penetration Testing, Signatures, Correlation Rules, End Point Analysis, Computer Forensics, digital forensics, Fireeye, Bro, Tanium, ELK, Splunk, Linux, shell, Snort, Yara, ArcSight, cybersecurity, Python, Perl, Shell, Bash, Powershell, Security+, CEH, SANS, CISSP, GCIH, GPEN, GREM, GCIA, GCFE, GCFA, GWAPT, GCED, cyber, cyber security, cyber sec, it, it specialist, nosc, nsoc, irs, irs soc, coding, software engineer, software engineering, coding, scripting, admin, administration, administrator, system, systems, sys, relocation, relo, cloud migration, cloud systems, , dod, department of defense, defense, military, army, navy, air force, air-force, airforce, marines, marine corp, federal, government, clearance, secret, top secret, top-secret, it, information technology, iat, cloud engineer, cloud engineering, Maryland, md, DMV, cyber threat hunter, soc, security operation center, security operations center, security operations centers, network operation security center, network security operation center, incident response, incident response team, hacker, hack, IRT, soc analyst, soc analysts, nsoc analyst, nosc analysts, cyber club, homelab, osi, osi models, google query, cloud incident response, security monitoring, information security, iso, information security officer, information security analyst, firewalls, mitigation, network security, risk management, vulnerability, vulnerability assessmentAurora Recommended Skills Computer Networks Computer Security Counter Intelligence Polygraph (Ci Clearance) Linux Sensitive Compartmented Information (Sci Clearance) Servicenow Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.