×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

SOC Analyst Level 3 Security Clearance

Job in St. Louis, Saint Louis, St. Louis city, Missouri, 63105, USA
Listing for: Crimson Phoenix
Full Time position
Listed on 2026-02-16
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 100000 - 125000 USD Yearly USD 100000.00 125000.00 YEAR
Job Description & How to Apply Below
Position: SOC Analyst Level 3 with Security Clearance
Location: St. Louis

Overview

Job Description:

What You Will Be Doing:
Coordinating and implementing tasks, performing analysis, and building/documenting response activities required during cyber security incident response, to include but not limited to actions such as implementing containment measures, IP blocks, domain blocks, and disabling user accounts on direction of the Government.

Responsibilities
  • Coordinating with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter intelligence personnel as required to perform advanced investigation and triage of incidents.
  • Collaborating with appropriate authorities in the production of security incident reports.
  • Categorizing incidents and events.
  • Coordinating with other contracts, organizations, activities, and other services as appropriate to ensure incidents are properly reported, contained, and eradicated.
  • Coordinating with other contracts, organizations, activities, and other services as appropriate to de-conflict blue / red team activity with open incidents/events.
  • Coordinating with other contracts, organizations, activities, and services to ensure NGA recovers from an incident/event.
  • Building timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions.
  • Documenting actions taken and analysis in the authorized ticketing system to a level of detail where the actions taken and analysis are capable of being systematically reconstructed.
  • Developing and, when approved by the Government, generating and updating reports in the Joint Incident Management System (JIMS), Incident Case Management System (ICMS), and/or other authorized reporting systems as directed.
  • Developing, maintaining, sustaining, and when properly authorized by the Government executing custom scripts, tools, and capabilities to collect and analyze data and to respond to incidents/events.
  • Performing digital media analysis on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis.
  • Developing and identifying indicators of compromise to send to Cybersecurity stakeholders and other Contract Services.
  • Providing adversary attribution.
  • Performing malware analysis and signature development.
  • Coordinating with CSOC Tier 1 and 2 services to remediate all discrepancies and provide recommendations to prevent reoccurrence.
#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary