
Description
Description
Science Applications International Corporation (SAIC) is seeking a SOC Manager/Tier 3 to join our team supporting a major state & local government customer. This position reports to the Security Director.
This role is 100% remote!
Essential duties of this position include:
- Performs Cybersecurity Defense & Analysis, Incident Response, Threat Analysis, Exploitation Analysis, and Cyber Investigations from the National Initiative for Cybersecurity Education (NICE) Framework.
- Work is typically performed in a Security Operations Center (SOC), Network Operations & Security Center (NOSC), Joint Operations Center (JOC), or similar environments.
- Duties are primarily categorized as Incident Investigation and Response, Security Operations, Incident Management, or similar roles.
- Engages in Identity and Access Management operations and utilizes Cyber tools to perform cyber work.
- Utilizes COTS/GOTS applications, ticketing systems, lab systems, forensic applications, and/or custom tools, techniques, and procedures (TTPs) to monitor systems for abnormal events and determine if events are to be deemed an incident.
- Determines if incidents are due to malicious or nefarious actions by one or more threat actors.
- Utilizes threat intelligence to determine if the incident is part of a named campaign to determine appropriate levels of response, or provide new intelligence based on investigative actions to threat intelligence teams, organizations, and/or external parties.
- Obtains information and evidence for legal proceedings or to provide to government counterparts for possible military, law enforcement, and/or counter-intelligence response actions/activities, Human Resources investigations, and/or management action.
- Works with system owners to restore affected systems to secure baseline configurations.
- Maintains chain of custody on items of evidentiary value.
- Collaborates with legal, HR, and other non-technical personnel to recommend formal proceedings against personnel.
- Researches, evaluates, and recommends new security tools, techniques, and technologies.
- Supports cyber metrics development, maintenance, and reporting.
- Provides briefings to senior staff.
Qualifications
Required Education and Qualifications:
· BS Degree and five (5) years or more experience; Masters and three (3) years or more experience; PhD and 0 years related experience; 4+ years of experience can be substituted in lieu of degree.
· Complete understanding and wide application of technical principles, theories, and concepts in the cybersecurity field.
· Ability to receive assignments in the form of objectives and establish goals to meet outlined objectives.
· General knowledge of related disciplines.
· Candidates must be able to pass a CJIS Criminal Justice background investigation and maintain CJIS clearance throughout employment term.
Required Experience:
· Providing technical solutions to a wide range of difficult problems requiring the analysis of identifiable factors.
· Independent determination and development of approaches to solutions with work reviewed upon completion for adequacy in meeting objectives.
· Demonstrating good judgment in selecting methods and techniques for obtaining solutions.
· Contributing to the completion of specific programs and projects within the government contracting space.
· Security+ or higher certifications
Preferred Experience:
· ITIL v4 certification preferred (Foundation or above)
· Providing technical solutions to a wide range of difficult problems requiring the analysis of identifiable factors.
· Independent determination and development of approaches to solutions with work reviewed upon completion for adequacy in meeting objectives.
· Demonstrating good judgment in selecting methods and techniques for obtaining solutions.
· Contributing to the completion of specific programs and projects.
Target salary range: $80,001 - $120,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.
Apply on company website