ABOUT THE ROLE
Second Front Systems (2F) is seeking a motivated SOC Analyst to support our team. We are a fast-growing entrepreneurial team working at the convergence of technology and national security. The work will be dynamic and wide-ranging with cybersecurity, DevSecOps, and cloud infrastructure roles supporting the deployment and scale of our Game Warden platform.As a SOC Analyst at Second Front Systems, you will help ensure that Game Warden maintains a strong security posture. You will play a critical role in safeguarding Second Front’s digital assets, platform, and customers by monitoring, detecting, investigating and responding to security incidents and threats.
Your extreme attention to detail will be essential in identifying anomalous activities and potential security breaches before they escalate. You will work closely with cross-organizational teams to analyze security event data, conduct in-depth investigations, and accomplish incident response procedures to mitigate and minimize impact. This role is essential to the security of our cloud platform and of the customer applications running on it.
What You'll Do
- Actively monitor security alerts and events using SIEM (Security Information and Event Management) tools to identify potential security incidents and threats.
- Analyze security event data to identify anomalous behavior or patterns. Investigate security alerts and assess the severity of each alert to determine the validity of the finding.
- Conduct proactive threat hunting activities to identify emerging threats and trends.
- Coordinate Incident Response activities and act as a primary Incident Response commander during events to contain, mitigate and remediate security incidents.
- Stay up to date with the latest cybersecurity threats, vulnerabilities and attack vectors.
- Document security events and incidents by providing detailed analyses of actions taken and recommended areas for improvements. You will contribute to post incident reviews and lessons learned sessions to improve Incident Response processes and procedures.
Skills You'll Bring to Our Team
- Security tooling analyst experience with different SIEMs, SOAR.
- Strong understanding of DoD network security, network protocols, traffic analysis, and ability to recognize indicators of compromise within network traffic.
- Hands on experience in monitoring and responding to security incidents within AWS and other cloud environments.
- Ability to review logs, identify trends, and query relevant information.
- Ability to create and implement incident response plans.
- 2+ years of relevant experience.
- Secret security clearance or higher.
- DOD 8570 Baseline Certification for CSSP Incident Responder (CySA+ Preferred.)
Preferred Qualifications
- Experience monitoring cloud native and containerized environments.
- Collaboration with cross-functional teams.
- Extensive experience with Department of Defense DevSecOps practices, policies, and security.
- Scripting experience (bash/python/etc.)
- Additional security certifications (ie. ISC2 CC, CEH, OSCP.)
$130,000 - $150,000 a yearThe base compensation for this role ranges from $130,000 to $150,000. Perks & BenefitsThis role is full time. As a public benefit corporation, we’re a team of purpose-driven trailblazers transforming the future of U.S. national security. We hire the best to do their best and, as such, we are committed to providing the perks and benefits you need to be successful—both in- and outside the workplace.We offer you:Competitive Salary100% Healthcare, vision and dental coverage401(k) + 3% company contributionWellness perks (Fitness classes, mental health resources)Equity incentive planTech + office supplies stipendAnnual professional development stipendFlexible paid time off + federal holidays offParental leaveWork from anywhereReferral BonusVisit our careers page to learn more.Apply for this job