cFocus Software Incorporated

cFocus Software Incorporated

Website

CBO - Tier 3 SOC Analyst

Role

CBO - Tier 3 SOC Analyst

Job type

Full-time

Posted

8 hours ago

Share this job

Salary

Not disclosed by employer

Job description

cFocus Software seeks a Tier 3 SOC Analyst to join our program supporting the Congressional Budget Office (CBO). This position is remote. This position requires a Public Trust clearance. Qualifications:

  • Active Public Trust clearance
  • B.S. Computer Science, Information Technology, or a related field
  • 5+ years of SOC Analyst experience
  • Expert knowledge of incident response, threat hunting, and detection engineering
  • Advanced experience with Microsoft Sentinel (SIEM) and Microsoft Defender tools
  • Strong understanding of MITRE ATT&CK framework and adversary tactics
  • Experience with digital forensics and malware analysis techniques
  • Ability to analyze logs across identity, endpoint, network, and cloud environments
  • Strong knowledge of AWS logs (CloudTrail, VPC Flow Logs) and enterprise security tools
  • Experience with KQL (Kusto Query Language) and advanced correlation analysis
  • Deep understanding of NIST frameworks (800-53, 800-61, 800-92) and Zero Trust principles
  • Experience with SOAR platforms and automation (Logic Apps, Sentinel playbooks)
  • Experience supporting federal environments and compliance (CUI, FTI, NIST, IRS 1075)
  • Experience leading incident response engagements and reporting to leadership
  • Preferred certifications include but are not limited to
  • GCIA, GCIH, CISSP, CEH, or equivalent cybersecurity certifications
  • Microsoft Sentinel or Microsoft security platform certifications
  • Relevant cloud security certifications (e.g., AWS security)
  • Privacy certifications (e.g., CIPP/US, CIPM) where applicable

Duties

  • Lead investigation and response for complex and high-severity security incidents
  • Perform advanced threat hunting using Microsoft Sentinel and Defender platforms
  • Conduct digital forensics, malware analysis, and root cause analysis (RCA)
  • Develop, tune, and optimize detection rules, analytics, and correlation logic
  • Map detections and activities to MITRE ATT&CK framework
  • Oversee incident lifecycle management (detection through containment, eradication, and recovery)
  • Support and improve SOC playbooks, automation workflows, and response procedures
  • Provide mentorship and guidance to Tier I and Tier II analysts
  • Identify security control gaps and recommend remediation strategies
  • Support red team, purple team, and adversary emulation exercises
  • Contribute to incident reports, quarterly threat reviews, and executive briefings

Powered by JazzHR

eL4JRT9Smm

Resume ExampleCover Letter Example

Explore more