SOC Security Analyst Tier 2

Remote
Full Time
Experienced

 

Are you an accomplished Information Security expert and have experience in IT security and security controls?

Do you desire to be a valued member of a team delivering high-end IT services and consulting for a cabinet-level Federal Government agency?

Hill Associates is searching for a SOC Security Analyst Tier 2  Provides hands-on technical expertise and is engaged in ensuring the confidentiality, integrity, availability, and non-repudiation of all IT systems operated by or on behalf of the Department of the Treasury. Whoever is selected for this position will assist in efforts to plan, develop, and oversee security aspects of multiple concurrent vital IT programs for Infrastructure Operations (IO); will perform against goals set by federal and contract management, and be expected to perform assigned duties with a high degree of independence.

What You Get To Do:

As a member of the IO SecOps team, some of your typical work assignments may include:

  • Provides technical expertise to the Security Operations (SecOps) team with respect to technical execution of daily workloads.
  •  Maintains hands-on operational, technical, and situational awareness of the planning and execution of multiple, concurrent computer SecOps activities of a Federal Agency
  • Identifies relevant cyber threat trends, Tactics, Techniques, and Procedures (TTPs), and cyber tool developments.
  •  Provides risk analysis recommendations and mitigation strategies on the safe and effective execution of SecOps operations.
  • Participates in the development of products, reports, and briefings for senior Treasury officials and customers explaining complex, technical findings and the strategic implications of vulnerabilities identified.
  • SOC Analysts serve as mid to senior-level Subject Matter Expert (SME) on technical operations across the operational lifecycle of in-scope systems.
  • Provides mentoring and professional guidancedevelopment to SecOps team members (skills sharing).
  • Create and update dailyweeklymonthly standard operating procedures as necessary
  • Participate in incident response activities as needed for systems and services within scope.
  • Participate in vulnerability management activities for systems and services within scope.
  • Undergoes required security training and development opportunities for the organization as assigned by management.
  • Performs analysis, reporting, and remediation (plan of action and milestones) of security incidents, threat assessments, and findings from audits, testing, and other sources to the assigned infrastructure and in-scope systems.
  • Ensures the consistency in individual work outcomes, and adequacy, and contributes to the success of the programs by consistently following established operational processes, procedures, and mechanisms for securely managing information systems security.
  • Identifies the need for system changes based on new security technologies or threats; reviews proposed new systems, networks, and software designs for potential security risks; and assists in the development of long-range plans for IT security systems that anticipate, identify, evaluate, mitigate, and minimize risks associated with IT systems vulnerabilities.
  •  Participates in systems security evaluations, audits, and reviews; participates in network and systems design to ensure implementation of appropriate systems security policies.
  • Provides expert technical advice, guidance, and recommendations to management and other technical specialists on compliance with Treasury’s security program, monitoring, and improvement of its security posture.
  • Consults with customers to evaluate functional requirements; coordinates with systems architects and developers to provide oversight in the development of IT design solutions.
  •  Identifies issues, impediments, and obstacles to achieving IT security goals and program success and provides potential solutions to management.
  • Assists in the development of policies, procedures, and strategies to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to Treasury systems and digital services offered by the government to the Department and its Bureaus, the general public, other agencies, and business entities in the public and private sector.
  •  Serves as a subject matter expert on high-level information technology issues related to security for personally identifiable information, sensitive but unclassified controlled unclassified information, classified information, as well as information privacy concerns as required.
  • Participates in efforts to address issues with IT security where precedents do not exist and that require the development of new concepts and approaches to determine the acceptability of these new approaches.
  • Serves as subject matter expert for a diverse range of issues related to IT security, technology, digital service delivery, and or technology policy, as well as more widespread issues affecting the substantive office’s mission in one or more areas.
  • Participates in technology initiatives or technology policy initiatives across the government, promoting the integration of secure digital applications, standards-based approaches to secure development, and modern project management and development processes.
  • Participates in and drives the adoption and creation of government-wide standards for developing digital services, based upon best practices from the private sector such as agile development methodologies and open-source practices.
  • Uses technical expertise, creativity, and judgment, to develop, define, and lead the integration of IT security into all aspects of software development, operations, and maintenance, devising innovative ways to solve problems of major importance. Reviews related security initiatives for technical and programmatic feasibility and adherence with the organization's and federal standards, regulations, and policies dealing with customer perspective on technology.
  • Utilizes Digital Analytics (qualitative and quantitative measurements of application system website data), in order to improve IT security and balance the customer experience across component areas. The incumbent conducts sophisticated research using quantitative and qualitative methods.
  • Conducts systems security evaluations, audits, and reviews. Gathers and analyzes findings; organizes documentation, consults with systems users, and develops recommendations used to identify and define systems security requirements.
  •  Monitors application of approved security procedures by systems users.
  • Develops, recommends, and implements approved security contingency plans, incident response plans, and disaster recovery procedures.
  • Maintains comprehensive knowledge of new technology and other developments in the field of information technology and cybersecurity. Instructs seniors, peers, and junior employees on new information and trends.

You Will Bring These Qualifications:

  • BS in Engineering, Cybersecurity, Information Technology, Computer Science, or equivalent.
  • 15 years of professional work experience, with 5 years of related experience in IT security, with knowledge of standard IT security best practices.
  • Excellent interpersonal and communications skills for interaction with customers, project leaders, team members, and other government agencies.
  • Ability to capture high-level technical information in a clear, concise manner.
  • Ability to think creatively and adapt creative thinking to what works for the organization.
  • U.S. Citizen.
  • Active US Government Clearance at the Secret level or higher is a MUST. 
  • Exceptional organizational and time-management skills.
  • Experience working with and in Government projects desired.

What We Can Offer You:

Hill Associates is an affirmative action and equal opportunity, employer. Employment decisions will be made without regard to race, color, religion, sex, age, national origin, military status, veteran status, handicap, physical or mental disability, sexual orientation, gender identity, genetic information, or other characteristics protected by law.

If you have visited our website for information about employment opportunities, or to apply for a position, and you require accommodation, please contact Hill Associates Recruiting Team at 202-656-6505 or via email at [email protected]. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodation.

Hill Associates offers a comprehensive, total rewards package that includes competitive compensation and a flexible benefits package that reflects our commitment to creating a diverse and supportive workplace.

 

Share

Apply for this position

Required*
Apply with Indeed
We've received your resume. Click here to update it.
Attach resume as .pdf, .doc, .docx, .odt, .txt, or .rtf (limit 5MB) or Paste resume

Paste your resume here or Attach resume file

To comply with government Equal Employment Opportunity and/or Affirmative Action reporting regulations, we are requesting (but NOT requiring) that you enter this personal data. This information will not be used in connection with any employment decisions, and will be used solely as permitted by state and federal law. Your voluntary cooperation would be appreciated. Learn more.

Invitation for Job Applicants to Self-Identify as a U.S. Veteran
  • A “disabled veteran” is one of the following:
    • a veteran of the U.S. military, ground, naval or air service who is entitled to compensation (or who but for the receipt of military retired pay would be entitled to compensation) under laws administered by the Secretary of Veterans Affairs; or
    • a person who was discharged or released from active duty because of a service-connected disability.
  • A “recently separated veteran” means any veteran during the three-year period beginning on the date of such veteran's discharge or release from active duty in the U.S. military, ground, naval, or air service.
  • An “active duty wartime or campaign badge veteran” means a veteran who served on active duty in the U.S. military, ground, naval or air service during a war, or in a campaign or expedition for which a campaign badge has been authorized under the laws administered by the Department of Defense.
  • An “Armed forces service medal veteran” means a veteran who, while serving on active duty in the U.S. military, ground, naval or air service, participated in a United States military operation for which an Armed Forces service medal was awarded pursuant to Executive Order 12985.
Veteran status



Voluntary Self-Identification of Disability
Voluntary Self-Identification of Disability Form CC-305
OMB Control Number 1250-0005
Expires 04/30/2026
Why are you being asked to complete this form?

We are a federal contractor or subcontractor. The law requires us to provide equal employment opportunity to qualified people with disabilities. We have a goal of having at least 7% of our workers as people with disabilities. The law says we must measure our progress towards this goal. To do this, we must ask applicants and employees if they have a disability or have ever had one. People can become disabled, so we need to ask this question at least every five years.

Completing this form is voluntary, and we hope that you will choose to do so. Your answer is confidential. No one who makes hiring decisions will see it. Your decision to complete the form and your answer will not harm you in any way. If you want to learn more about the law or this form, visit the U.S. Department of Labor’s Office of Federal Contract Compliance Programs (OFCCP) website at www.dol.gov/ofccp.

How do you know if you have a disability?

A disability is a condition that substantially limits one or more of your “major life activities.” If you have or have ever had such a condition, you are a person with a disability. Disabilities include, but are not limited to:

  • Alcohol or other substance use disorder (not currently using drugs illegally)
  • Autoimmune disorder, for example, lupus, fibromyalgia, rheumatoid arthritis, HIV/AIDS
  • Blind or low vision
  • Cancer (past or present)
  • Cardiovascular or heart disease
  • Celiac disease
  • Cerebral palsy
  • Deaf or serious difficulty hearing
  • Diabetes
  • Disfigurement, for example, disfigurement caused by burns, wounds, accidents, or congenital disorders
  • Epilepsy or other seizure disorder
  • Gastrointestinal disorders, for example, Crohn's Disease, irritable bowel syndrome
  • Intellectual or developmental disability
  • Mental health conditions, for example, depression, bipolar disorder, anxiety disorder, schizophrenia, PTSD
  • Missing limbs or partially missing limbs
  • Mobility impairment, benefiting from the use of a wheelchair, scooter, walker, leg brace(s) and/or other supports
  • Nervous system condition, for example, migraine headaches, Parkinson’s disease, multiple sclerosis (MS)
  • Neurodivergence, for example, attention-deficit/hyperactivity disorder (ADHD), autism spectrum disorder, dyslexia, dyspraxia, other learning disabilities
  • Partial or complete paralysis (any cause)
  • Pulmonary or respiratory conditions, for example, tuberculosis, asthma, emphysema
  • Short stature (dwarfism)
  • Traumatic brain injury
Please check one of the boxes below:

PUBLIC BURDEN STATEMENT: According to the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless such collection displays a valid OMB control number. This survey should take about 5 minutes to complete.

You must enter your name and date
Human Check*