×
Register Here to Apply for Jobs or Post Jobs. X

SOC Analyst

Job in Fairfax, Fairfax County, Virginia, 22032, USA
Listing for: KeenLogic
Full Time position
Listed on 2026-01-19
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

SOC Analyst – Drug Enforcement Administration (DEA)

Keen Logic is seeking to hire an Information Security Operation Analyst (SOC Analyst) to join our team at the Drug Enforcement Administration. The Information Security Analyst is responsible for designing and implementing solutions for protecting the confidentiality, integrity, and availability of sensitive information.

This is a full‑time position offering Fortune 500–level health, dental, and vision benefits, PTO, 401(k), and life insurance. This is an onsite role with a daily schedule from 10:00 AM to 6:00 PM, based in Merrifield, VA.

About the Role

This is a Security Operations Center (SOC) position focused primarily on cybersecurity incident detection and response. Other primary areas of focus include:

  • Zero‑day events
  • Utilizing cybersecurity tools to conduct investigations and analysis of events
  • Utilizing the seven steps of the Incident Response process

All duties support one or more of the following cybersecurity‑related functions: information security, SA&A, incident response, cybersecurity, insider threat, computer forensics, vulnerability assessment and management, network data capture, intrusion detection, log management, auditing, security incident and event management (SIEM), and penetration testing.

Personnel assigned to this role will primarily serve on the Operations & Response (O&R) Team and may also support the Vulnerability Assessment and Penetration Test (VAPT) and Engineering teams.

This position also coordinates with the Cybersecurity Services Section and other client divisions, including:

  • IT Operations
  • Engineering & Integration
  • Software Operations
  • Office of Investigative Technology
Required Qualifications
  • Must be a U.S. citizen with an active Secret or Top Secret clearance
    • Must be eligible for a Top Secret clearance if requested
  • Bachelor’s degree from an accredited college or university in one or more of the following disciplines (or equivalent documented formal training):
    • Computer Science
    • Information Systems
    • Engineering
    • Business
    • Physical Science
    • Other technology‑related disciplines
  • 6+ years of documented work experience performing any combination of:
    • Information System Security
    • Security Assessment & Authorization
    • Cybersecurity
    • Computer Forensics
    • Insider Threat
Preferred Qualifications
  • CompTIA CySA+ cybersecurity analyst certification
  • Cybersecurity incident response and detection experience
  • Experience in cybersecurity event triaging using the seven steps of the Incident Response Process (IRP)
  • Security Operations Center (SOC) experience
  • Conducting cyber event investigations to determine root cause and identify true/false positives
  • Creating rules, thresholds, and policies for cybersecurity tools (IOCs/IOAs)
    Verification and validation, containment, eradication, and recovery from incidents
  • Experience validating hashes, malicious IPs, and URLs
  • Experience investigating malicious emails and payloads
  • Requirements analysis, program development, architecture, engineering, integration, and deployment of IT products in an enterprise environment
  • Ability to create and monitor multiple cybersecurity tool dashboards
  • Open-source intelligence gathering experience
  • Threat hunting and vulnerability assessment experience
  • Knowledge of SIEM tools and query generation
Duties
  • Perform network security monitoring and incident response for a large organization
  • Coordinate with other government agencies to record and report incidents
  • Maintain records of security monitoring and incident response activities using case management and ticketing technologies
  • Monitor SIEM tools to identify security issues for remediation
  • Recognize intrusion attempts and compromises through detailed analysis of event data
  • Communicate alerts regarding intrusions and compromises to networks, applications, and operating systems
  • Assist with implementation of countermeasures or mitigating controls
  • Support threat data analysis from classified, proprietary, and open-source resources
  • Support Team Lead in developing recommendations for changes to Standard Operating Procedures
  • Monitor and review logs and create new security tool signatures
  • Perform intrusion detection, log and audit management, vulnerability assessment, compliance…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary