Tier 2 SOC Analyst

Posted Date 3 days ago(2/15/2018 11:37 AM)
Job Location
Required Clearance
No clearance
Information Technology
Employment Type
Full Time
Hiring Company
General Dynamics Mission Systems

Basic Qualifications

Bachelor's degree in a related specialized area or equivalent is required plus a minimum of 2 years of relevant experience; or Master's degree plus a minimum of 0 years of relevant experience.


Due to the nature of work performed, US citizenship is required.



Responsibilities for this Position

The General Dynamics Mission Systems (GDMS) Security Operations Center (SOC) has an opening for a Tier 2 SOC Analyst. The GDMS SOC is responsible for monitoring, scanning, reporting, risk assessments, and incident response for the GDMS Enterprise.   This position will providing guidance and direction of Tier 1 Analysts while performing constant monitoring of the GDMS WAN/LAN and assess vulnerabilities, scrutinizing alerts from a myriad of sensors and systems, and responding to security events.  The Tier 2 SOC Analyst will have a strong understanding of IPS/IDS systems, network traffic communications standards (OSI, TCP/IP Models) and be able to translate GUI representations from a multitude of tools/applications to determine the identification, extent, and success/failure of network attacks. He/she will coordinate and host meetings, and organize/manage scheduling for all analysts.  This person will preferably have a minimum of one year of previous operational experience and knowledge of SourceFire/FirePower.  He/she will preferably have knowledge and use of three or more of the following tools: ArcSight, Aruba ClearPass, Fidelis, Flexcera, FireEye HX, InfoBlox, IronPort, Firewalls, Linux, Palo Alto, PhishMe (Triage & Simulator), Redline, Remedy, Sharepoint, SNORT, SolarWinds, Splunk, Symantec Endpoint Protection (SEP), TCPDump, Tenable NESSUS, and Wireshark.



  • Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems
  • Researches attempted or successful efforts to compromise systems security and designs countermeasures
  • Maintains hardware, software and network firewalls and encryption protocols
  • Administers security policies to control physical and virtual access to systems
  • Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems
  • Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems
  • Applies current computer science technologies to the design, development, evaluation, and integration of computer systems and networks to maintain system security
  • Provides security engineering and integration services to customers
  • Involved in a wide range of security issues including architectures, electronic data traffic and network access 


  • Very solid knowledge of information technology (IT) architectural concepts and frameworks
  • Very solid knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption)
  • Very solid knowledge of security system design tools, methods, and techniques
  • Very solid knowledge of the enterprise information technology (IT) architecture
  • Very solid knowledge of the organization's enterprise information technology (IT) goals and objectives
  • Skill in discerning the protection needs (i.e., security controls) of information systems and networks
  • Very solid knowledge of the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF])
  • Very solid knowledge of Personally Identifiable Information (PII) and Payment Card Industry (PCI) data security standards
  • Very solid knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures
  • Very solid knowledge of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defense-in-depth)
  • Very solid knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model)
  • Developing professional expertise, applies company policies and procedures to resolve a variety of issues
  • Fully proficient and able to perform all responsibilities associated with the position
  • Grasps and applies new information quickly and handles more complex assignments
  • Shows initiative on assignments, exercises independent judgment and professionally executes projects with little direction
  • The selected individual will work a 9-hour shift within these hours to meet operational requirements. Periodic on-call duties are required.

Desired Certifications: CCNA, CISSP, Network +, Security + (or other applicable certifications)

Company Overview

General Dynamics Mission Systems (GDMS) engineers a diverse portfolio of high technology solutions, products and services that enable customers to successfully execute missions across all domains of operation.  With a global team of 13,000+ top professionals, we partner with the best in industry to expand the bounds of innovation in the defense and scientific arenas.  Given the nature of our work and who we are, we value trust, honesty, alignment and transparency.  We offer highly competitive benefits and pride ourselves in being a great place to work with a shared sense of purpose.  You will also enjoy a flexible work environment where contributions are recognized and rewarded.  If who we are and what we do resonates with you, we invite you to join our high performance team!


General Dynamics is an Equal Opportunity/Affirmative Action Employer that is committed to hiring a diverse and talented workforce.  EOE/Disability/Veteran


Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed

Connect With Us!