Senior SOC Analyst

Posted 18 Days Ago
Be an Early Applicant
Merrifield, VA
In-Office
Senior level
Information Technology • Consulting
The Role
The Senior SOC Analyst leads advanced incident detection and response, conducts investigations, mentors junior staff, and collaborates on improving cybersecurity posture within the organization.
Summary Generated by Built In
Senior SOC Analyst and Incident Responder
KeenLogic is seeking to hire a Senior SOC Analyst & Incident Responder to join our team at the Drug Enforcement Administration. All the duties listed support one or more of the following cybersecurity- related functions; information security, SPAA, incident response, cyber security, insider threat, computer forensics, vulnerability assessment and management, network data capture, intrusion detection, log management, auditing, security incident and event management (SIEM), and penetration testing.
This is a full-time position offering Fortune 500-level health/dental/vision, PTO, 401k, and Life Insurance. This onsite role, with a daily schedule from 7 AM to 3 PM, based in Merrifield, VA.
Position Summary

The Senior SOC Analyst is a key member of the 24/7/365 Security Operations Center, which serves as the escalation point for advanced investigations, incident response, and proactive threat hunting. This role conducts higher-level analysis than other analysts on the team. A senior SOC analyst performs deep forensic investigations, correlates multi-source threat intelligence information, and guides containment and remediation strategies. The Senior SOC Analyst identifies and mitigates advanced threats across enterprise IT endpoints, cloud environments, and OT systems. They leverage frameworks like the MITRE ATT&CK framework and others to detect, disrupt, and prevent malicious activity from occurring in the enterprise environment.
They work closely with the SOC manager and leads. They mentor junior staff, assist to refine SOC processes, and ensures the organization maintains a strong cybersecurity posture. They collaborate with engineers, threat intelligence and forensics teams to enhance detection capabilities, improve incident response readiness, and deliver actionable security insights to leadership.
Required Qualifications
  • Active Secret or Top Secret clearance
  • Master’s degree and 8 years or Bachelor's degree and 11 years
    • Documented work experience performing any combination of Information System Security, Security Assessment & Authorization, Cybersecurity, Computer Forensics, or Insider Threat
  • One of the following required:
    • CBROPS
    • CFR
    • CompTIA: CySA+, Security + CE, CASP+CE
    • FITSP-O
    • SANS: GCFA, GCIA, GDSA, GICSP
    • CCNA-Security, CCNP Security
    • CISSP (or associate), CCSP
    • CISA
    • SSCP
    • CND
Duties and Responsibilities
  1. Lead advanced incident detection, investigation, and analysis efforts.
    1. Correlate SIEM, EDR, IDS/IPS, and firewall data to identify and analyze potential incidents.
 
    1. Perform deep-dive investigations to determine root cause, scope, and impact of incidents.
    2. Apply MITRE ATT&CK and other frameworks for adversary TTP identification.
    3. Conduct kill-chain and supply chain analysis to understand and counter threats.
  1. Coordinate and direct complex incident response activities.
    1. Guide preparation, identification, containment, eradication, and recovery actions in collaboration with SOC, forensics, and engineering teams.
    2. Serve as the primary escalation point for high-impact or advanced incidents.
    3. Ensure incident handling aligns with established guidelines, response plans, and playbooks.
  2. Conduct proactive threat hunting to identify emerging risks.
    1. Analyze telemetry, logs, and behavioral patterns for indicators of compromise or attack.
    2. Hunt for advanced persistent threats and undiscovered vulnerabilities.
    3. Use advanced queries in SOC cybersecurity tools to detect anomalous or suspicious activity.
  3. Work with forensic teams to ensure proper forensic collection, preservation, and analysis of digital evidence.
    1. Coordinate with forensics teams to ensure chain-of-custody and evidence integrity.
    2. Extract and analyze relevant artifacts to support investigations and post-incident reviews.
    3. Document and communicate forensic findings to stakeholders.
  4. Develop and enhance SOC processes, playbooks, and detection capabilities.
    1. Refine detection rules, alert thresholds, and automation workflows in SIEM/SOAR platforms and other cybersecurity tools.
    2. Create SOPs, knowledge base articles, and training materials for SOC staff.
    3. Recommend and guide implementation of new detection and analysis tools.
  5. Perform threat intelligence collection, analysis, and dissemination.
    1. Gather threat data from internal, classified, and open-source intelligence feeds.
    2. Analyze and contextualize intelligence to produce actionable recommendations.
    3. Share relevant threat information with SOC, leadership, and partner teams.
  6. Mentor and train SOC analysts to improve investigative capabilities and analytical thought process.
    1. Provide real-time guidance during active incidents.
    2. Conduct regular training sessions, tabletop exercises, and red/blue team drills.
    3. Validate analyst findings and provide feedback to designed to provoke thought, improve accuracy, and investigative thoroughness.
  7. Collaborate with stakeholders to strengthen overall cybersecurity posture.
    1. Work with engineering, IT, and cloud teams to address identified vulnerabilities.
    2. Participate in tool evaluations, recommending solutions that enhance SOC capabilities and identify capability overlap.
    3. Support internal coordination with DEA sections, divisions, and external entities.
  8. Maintain documentation and reporting for SOC operations.
    1. Record investigative steps, evidence, and incident timelines in case management systems.
    2. Generate incident reports, trend analyses, and post-mortem summaries.
    3. Provide executive-level briefings on security events and SOC performance.

Top Skills

Casp+Ce
Ccnp Security
Cisa
Cisco Ccna-Security
Cissp
Cnd
Comptia Cysa+
Edr
Gcia
Gdsa
Gicsp
Ids/Ips
Mitre Att&Ck
Sans Gcfa
Security + Ce
SIEM
Sscp
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
Fredericksburg, VA
7 Employees
Year Founded: 2012

What We Do

Today’s government agencies must continually evolve to keep pace with the dynamic and rapidly changing technology landscape. To ensure continual innovation and improvement, these agencies must be able to anticipate all future needs while embracing technological advancements.

At KeenLogic, we create value through differentiation, innovation, and technology to drive high-quality enterprise IT services such as help desk as a service — for government customers. We combine the latest states of “what is” with an unrealized yet needed version of “what could be.”


KeenLogic operates two distinct lines of business:
(1) Enterprise IT Services (Helpdesk/Service Desk)
(2) Network/Internet Services (Fixed-Wireless Microwave Broadband)

We have a 10-year track record of high-quality performance and service delivery and a reputation for taking exceptional care of our team.

The company is well funded and capitalized to support new project ramp-up and overhead costs, has a highly experienced executive and management team, and a board of directors with over 20 years of management and operations experience.

We aim to provide the highest standard of customer service to government agencies by leveraging a corporate foundation that is built on CMMI Level III business processes, leadership, and financial strength.

Key attributes:
• 10-year history of providing quality, customer-focused IT solutions
• Excellent past performance and track record
• 95% employee retention rate
• Small business agility with large business resources
• Secret facility clearance
• Well capitalized for project ramp-up
• KeenLogic is a reputed enterprise IT services and help desk solutions provider that answers today’s problems while anticipating the needs of tomorrow.

Similar Jobs

Cox Enterprises Logo Cox Enterprises

Director, Vendor Performance Management (Cox Automotive Fleet Client Solutions and Delivery)

Automotive • Cloud • Greentech • Information Technology • Other • Software • Cybersecurity
Remote or Hybrid
VA, USA
50000 Employees
132K-219K Annually

ServiceNow Logo ServiceNow

Sr Enterprise Account Exec - Energy Vertical

Artificial Intelligence • Cloud • HR Tech • Information Technology • Productivity • Software • Automation
Remote or Hybrid
Vienna, VA, USA
28000 Employees
143K-212K Annually

ServiceNow Logo ServiceNow

Consultant

Artificial Intelligence • Cloud • HR Tech • Information Technology • Productivity • Software • Automation
Remote or Hybrid
Vienna, VA, USA
28000 Employees
147K-242K Annually

Federal Reserve Bank of Boston Logo Federal Reserve Bank of Boston

Architect

Fintech • Information Technology • Payments • Sharing Economy • Financial Services • Cryptocurrency
In-Office
12 Locations
1200 Employees
150K-225K Annually

Similar Companies Hiring

Scrunch AI Thumbnail
Software • SEO • Marketing Tech • Information Technology • Artificial Intelligence
Salt Lake City, Utah
Amplify Platform Thumbnail
Fintech • Financial Services • Consulting • Cloud • Business Intelligence • Big Data Analytics
Scottsdale, AZ
62 Employees
Standard Template Labs Thumbnail
Software • Information Technology • Artificial Intelligence
New York, NY
10 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account