Description
ABOUT THE ROLE
Second Front Systems (2F) is seeking a motivated SOC Analyst to support our team. We are a fast-growing entrepreneurial team working at the convergence of technology and national security. The work will be dynamic and wide-ranging with cybersecurity, DevSecOps, and cloud infrastructure roles supporting the deployment and scale of our Game Warden platform.
As a SOC Analyst at Second Front Systems, you will help ensure that Game Warden maintains a strong security posture. You will play a critical role in safeguarding Second Front’s digital assets, platform, and customers by monitoring, detecting, investigating and responding to security incidents and threats. Your extreme attention to detail will be essential in identifying anomalous activities and potential security breaches before they escalate. You will work closely with cross-organizational teams to analyze security event data, conduct in-depth investigations, and accomplish incident response procedures to mitigate and minimize impact. This role is essential to the security of our cloud platform and of the customer applications running on it.
\n- Actively monitor security alerts and events using SIEM (Security Information and Event Management) tools to identify potential security incidents and threats.
- Analyze security event data to identify anomalous behavior or patterns. Investigate security alerts and assess the severity of each alert to determine the validity of the finding.
- Conduct proactive threat hunting activities to identify emerging threats and trends.
- Coordinate Incident Response activities and act as a primary Incident Response commander during events to contain, mitigate and remediate security incidents.
- Stay up to date with the latest cybersecurity threats, vulnerabilities and attack vectors.
- Document security events and incidents by providing detailed analyses of actions taken and recommended areas for improvements. You will contribute to post incident reviews and lessons learned sessions to improve Incident Response processes and procedures.
- Security tooling analyst experience with different SIEMs, SOAR.
- Strong understanding of DoD network security, network protocols, traffic analysis, and ability to recognize indicators of compromise within network traffic.
- Hands on experience in monitoring and responding to security incidents within AWS and other cloud environments.
- Ability to review logs, identify trends, and query relevant information.
- Ability to create and implement incident response plans.
- 2+ years of relevant experience.
- Secret security clearance or higher.
- DOD 8570 Baseline Certification for CSSP Incident Responder (CySA+ Preferred.)
- Experience monitoring cloud native and containerized environments.
- Collaboration with cross-functional teams.
- Extensive experience with Department of Defense DevSecOps practices, policies, and security.
- Scripting experience (bash/python/etc.)
- Additional security certifications (ie. ISC2 CC, CEH, OSCP.)
Perks & Benefits
This role is full time. As a public benefit corporation, we’re a team of purpose-driven trailblazers transforming the future of U.S. national security. We hire the best to do their best and, as such, we are committed to providing the perks and benefits you need to be successful—both in- and outside the workplace.
We offer you:
Competitive Salary
100% Healthcare, vision and dental coverage
401(k) + 3% company contribution
Wellness perks (Fitness classes, mental health resources)
Equity incentive plan
Tech + office supplies stipend
Annual professional development stipend
Flexible paid time off + federal holidays off
Parental leave
Work from anywhere
Referral BonusVisit our careers page to learn more.
Please mention the word **KNOWLEDGEABLE** and tag RMjYwMDoxOTAwOjIwMDA6ZWE6OjE6MTUwMQ== when applying to show you read the job post completely (#RMjYwMDoxOTAwOjIwMDA6ZWE6OjE6MTUwMQ==). This is a beta feature to avoid spam applicants. Companies can search these words to find applicants that read this and see they're human.