hatch I.T. is partnering with Expression to find an SOC Analyst. See details below:
About The Role:
Expression is seeking an SOC Analyst to join their team in support of the National Telecommunications and Information Administration (NTIA) ISCOM Division. In this role, you will provide cyber threat monitoring, analysis, and incident response support that strengthens program situational awareness and ensures resilience of critical federal networks. You will support Tier 1 and Tier 2 SOC operations, contribute to SOC playbook development, and help mature cyber defense strategies in a mission-focused environment.
About the Company:
Founded in 1997 and headquartered in Washington DC, Expression provides data fusion, data analytics, software engineering, information technology, and electromagnetic spectrum management solutions to the U.S. Department of Defense, Department of State, and national security community. Expression’s “Perpetual Innovation” culture focuses on creating immediate and sustainable value for their clients via agile delivery of tailored solutions built through constant engagement with their clients. Expression was ranked #1 on the Washington Technology 2018's Fast 50 list of fastest growing small business Government contractors and a Top 20 Big Data Solutions Provider by CIO Review.
hatch I.T. is partnering with Expression to find an SOC Analyst. See details below:About The Role:Expression is seeking an SOC Analyst to join their team in support of the National Telecommunications and Information Administration (NTIA) ISCOM Division. In this role, you will provide cyber threat monitoring, analysis, and incident response support that strengthens program situational awareness and ensures resilience of critical federal networks. You will support Tier 1 and Tier 2 SOC operations, contribute to SOC playbook development, and help mature cyber defense strategies in a mission-focused environment.About the Company:Founded in 1997 and headquartered in Washington DC, Expression provides data fusion, data analytics, software engineering, information technology, and electromagnetic spectrum management solutions to the U.S. Department of Defense, Department of State, and national security community. Expression’s “Perpetual Innovation” culture focuses on creating immediate and sustainable value for their clients via agile delivery of tailored solutions built through constant engagement with their clients. Expression was ranked #1 on the Washington Technology 2018's Fast 50 list of fastest growing small business Government contractors and a Top 20 Big Data Solutions Provider by CIO Review.
Responsibilities:
Monitor, detect, and analyze security threats, risks, and alerts using SOC tools, and initiate escalation as required.
Conduct cyber threat analysis and contribute to reports for program situational awareness.
Provide Tier 1 response to security incidents and support escalation to Tier 2 during high-volume or critical events.
Conduct functional incident response teams during shifts, ensuring accountability and effective resolution.
Conduct malware analysis (static and dynamic) and assess Indicators of Compromise (IOCs).
Perform network forensics and deep packet inspection to investigate intrusions.
Implement remediation strategies and support recovery activities after incidents.
Recommend process improvements and create new detection content to strengthen SOC operations.
Conduct proactive monthly threat hunts and provide reports to stakeholders.
Collaborate with cyber teams for incident escalation, coordinated responses, and SOC policy/procedure development.
Qualifications:
Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, or related field; OR equivalent certifications (CompTIA Security+, CISSP, GCIH, GCIA).
Minimum of 4 years of experience in security operations, incident response, or cyber threat analysis.
Strong knowledge of SOC operations, incident detection, and response workflows.
Familiarity with malware analysis, network forensics, and packet-level inspection.
Excellent analytical, problem-solving, and communication skills.
Active Secret or Top Secret clearance required (U.S. Citizenship required)
Preferred Experience
Advanced certifications such as CISSP, GCFA, GCIH, GCIA, or equivalent.
Prior experience supporting NTIA, Department of Commerce, or other federal civilian agencies.
Hands-on experience with SIEM platforms, IDS/IPS, and endpoint monitoring tools.
Familiarity with the NIST Cybersecurity Framework and Risk Management Framework (RMF).
Experience developing and maturing SOC playbooks, processes, and detection capabilities.
These cookies are necessary for the website to function and cannot be turned off in our systems. You can set your browser to block these cookies, but then some parts of the website might not work.
Security
User experience
Target group oriented cookies
These cookies are set through our website by our advertising partners. They may be used by these companies to profile your interests and show you relevant advertising elsewhere.
Google Analytics
Google Ads
We use cookies
🍪
Our website uses cookies and similar technologies to personalize content, optimize the user experience and to indvidualize and evaluate advertising. By clicking Okay or activating an option in the cookie settings, you agree to this.
The best remote jobs via email
Join 5'000+ people getting weekly alerts with remote jobs!