Senior SOC Analyst Job at Summit-Tek, Arlington, VA

MFZ4UHc1d25keVg0ZGtnbGR0MjU0Rkk4SkE9PQ==
  • Summit-Tek
  • Arlington, VA

Job Description

Senior SOC Analyst Job Description:


Position Summary:

The Senior SOC Analyst is a key member of a 24/7/365 Security Operations Center, serving as the escalation point for advanced investigations, incident response, and proactive threat hunting. This role conducts higher-level analysis than other analysts on the team, performing deep forensic investigations, correlating multi-source threat intelligence, and guiding containment and remediation strategies. 

The Senior SOC Analyst identifies and mitigates advanced threats across enterprise IT endpoints, cloud environments, and OT systems. They leverage frameworks such as MITRE ATT&CK and others to detect, disrupt, and prevent malicious activity across enterprise environments. 

This position works closely with SOC leadership to mentor junior staff, refine processes, and maintain a strong cybersecurity posture. Collaboration with engineers, threat intelligence, and forensics teams is essential to enhance detection capabilities, improve incident response readiness, and deliver actionable insights to leadership. 


Key Responsibilities:

  • Lead advanced incident detection, investigation, and analysis efforts. 
  • Correlate SIEM, EDR, IDS/IPS, and firewall data to identify and analyze potential incidents. 
  • Perform deep-dive investigations to determine root cause, scope, and impact of incidents. 
  • Apply MITRE ATT&CK and similar frameworks to identify adversary tactics, techniques, and procedures (TTPs). 
  • Conduct kill-chain and supply chain analysis to understand and counter threats. 
  • Coordinate and direct complex incident response activities, including identification, containment, eradication, and recovery actions. 
  • Serve as the primary escalation point for high-impact or advanced incidents. 
  • Conduct proactive threat hunting to identify emerging risks and undiscovered vulnerabilities. 
  • Analyze telemetry, logs, and behavioral patterns for indicators of compromise or attack. 
  • Use advanced queries in cybersecurity tools to detect anomalous or suspicious activity. 
  • Ensure proper forensic collection, preservation, and analysis of digital evidence in collaboration with forensics teams. 
  • Extract and analyze relevant artifacts to support investigations and post-incident reviews. 
  • Develop and enhance SOC processes, playbooks, and detection capabilities. 
  • Refine detection rules, alert thresholds, and automation workflows in SIEM/SOAR and other tools. 
  • Create SOPs, knowledge base articles, and training materials for SOC staff. 
  • Perform threat intelligence collection, analysis, and dissemination using internal and open-source feeds. 
  • Produce actionable intelligence and share relevant threat information with leadership and partner teams. 
  • Mentor and train SOC analysts to improve investigative and analytical skills. 
  • Provide real-time guidance during active incidents. 
  • Conduct training sessions, tabletop exercises, and red/blue team drills. 
  • Collaborate with stakeholders to strengthen the overall cybersecurity posture. 
  • Work with IT, cloud, and engineering teams to address vulnerabilities and improve defenses. 
  • Participate in tool evaluations and recommend solutions to enhance SOC capabilities. 
  • Maintain documentation and reporting for SOC operations, including incident timelines, reports, and post-mortem summaries. 
  • Provide executive-level briefings on security events and SOC performance. 


Required Qualifications:

  • Education: Master’s degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science from an accredited institution fulfills the educational requirement. 
  • Experience: Minimum of eight (8) years of experience in Information Technology (IT) or Information Security (IS). 
  • This includes any combination of relevant experience from the areas above, not eight years for each. 
  • Certifications: Must hold at least one DoD 8140/8570-compliant certification or be able to obtain one within six (6) months of hire. Certification must be maintained during employment. 
  • Clearance: Must hold an active Secret clearance or higher and be eligible for Top Secret if required.  


Education and Experience Substitution:

Additional experience may substitute for education, and vice versa: 

  • 1.5 years of relevant experience = 1 year of education. 
  • High school diploma = +3 years’ experience to reach an associate degree. 
  • Associate degree = +6 years’ experience to reach a master’s degree. 
  • Relevant DoD 8140 intermediate or advanced certifications may count as 1.5 years of experience. 


Preferred Qualifications:

Cyber Defense Analyst (Advanced) Certifications:  

  • CBROPS, CFR 
  • CompTIA: CySA+, Security+ CE, CASP+ CE 
  • FITSP-O 
  • SANS: GCFA, GCIA, GDSA, GICSP 
  • Cisco: CCNA Security, CCNP Security 
  • CISSP (or Associate), CCSP 
  • CISA, SSCP, CND 


Additional Information:

Personnel in this role may also serve as subject matter experts (SMEs) or provide guidance and recommendations in accordance with industry best practices, federal cybersecurity standards, and applicable regulations. This position requires expertise across multiple cybersecurity domains, including: 

  • Security architecture and design 
  • Vulnerability analysis and penetration testing 
  • Cloud security and DevSecOps 
  • Incident and contingency response 
  • Development of cybersecurity strategies, metrics, and continuous monitoring programs 
  • Supply chain security and acquisition risk management 


Job Type: Full-time 

Pay: $120,668.00 - $133,950.00 per year 

Benefits:

  • Paid time off 

 
Application Question(s):

  • Do you have experience working with cloud-based systems (AWS, Azure, GCP) in a FedRAMP or government-compliant environment? 


Education:

  • Master's (Preferred) 

License/Certification:

  • DoD 8140 certification (Required) 


Security clearance:

  • Secret (Required) 


Ability to Commute:

  • Arlington, VA 22202 (Required) 

Work Location: In person 

Job Tags

Full time,

Similar Jobs

Openkyber

Salesforce Solution Architect Job at Openkyber

 ...Technical Expertise: Solid understanding of Salesforce Platform, IT systems, software development, and sales-related technology infrastructure. Project Management Skills: Proven ability to manage complex projects, prioritize tasks, and meet deadlines in a fast... 

IMT Insurance

Project Coordinator Intern Job at IMT Insurance

IMT Insurance is now accepting applications for our Summer 2026 Project Coordinator Internship position within the IMT Software Services department. IMT Software Services is a division of IMT Insurance and offers programs a complete suite of software for today's Mutual ...

Aon

Early Careers Health & Benefits Intern Job at Aon

 ...strategic insights (gained through our extensive data analytics and actuarial capabilities) with innovative solutions that helps clients...  ...professional environment, networking opportunities, learning internal systems, and honing interpersonal and team-building skills... 

Home Alliance

Handyman - Riverside,CA Job at Home Alliance

 ...Handyman Subcontractor Position (Hourly Pay + Referral Bonus!) We are looking for a reliable and skilled Handyman to join our team and provide excellent customer service to our clients. This is a subcontractor position , and you must have your own tools and truck... 

Dunkin'

Cake Decorator Job at Dunkin'

 ...Full Job Description Cake decorating experience, preferably with ice cream cakes and treats Dependable and reliable Creative and artistic abilities Proficient in use of all cake decorating tools and equipment Ability to stand on your feet for long periods...