logo inner

SOC Chief - FCC

cfocussoftwareWashington D.c., United StatesOnsite
cFocus Software seeks a SOC Chief to join our program supporting the Federal Communications Commission (FCC). This position is on-site in Washington, DC.

Qualifications:


  • Bachelor’s degree in Information Technology, Cybersecurity, Computer Science, Information Technologies, or other related fields
  • Certified Information Systems Security Professional (CISSP).
  • GIAC Incident Response Certification. and
  • Microsoft Certified Security Operations Analyst Associate 
  • 7+ years of experience in SOC operations and incident response including SOC management and an IR commander role
  • Core competencies in leading Information Security GAP Analysis review. and cyber security operations and incident response
  • Possess the knowledge, skills, tasks, and capabilities described in the NICE Work Roles for Incident Response (PD-WRL-003), Insider Threat Analysis (PD-WRL-005), and Threat Analysis (PD-WRL-006) as outlined in the NICE Work Role Framework
  • 7+ years of experience with Cyber Threats, Cyber Threat Intelligence, Insider Threat Hunting, Threat Hunting and Forensics, & Incident Assessment and Response

Duties:


  • Establish a Monitoring and Analysis support team (the SOC at FCC) dedicated to systematically assessing Cybersecurity information sourced from sensors, analytical systems, and various cybersecurity tools.
  • Identify and investigate any unusual activities highlighted by security apparatus or reported by external sources, FCC units, administrators, or users via various channels.
  • Evaluate, implement, and maintain intrusion detection sensors and software and deliver informal reports and Technical Evaluation Reports (TER) resulting from their assessments.
  • Proactively monitor, detect, analyze, respond to, and report cybersecurity events in compliance with Federal requirements
  • Receive automated, user-reported, and externally reported alerts of suspicious activity
  • Continuously monitor all IT systems and assets
  • Investigate alerts and triage incidents, analyze root causes, and respond to minimize damage and recover from cyber incidents.
  • Monitor system status, escalate potential incidents, and manage incident cases and tickets.
  • Assess risks for High Assurance Gateway access and Web Access Requests
  • Analyze reports, apply antivirus, intrusion detection, DMA, and perform vulnerability assessments
  • Author custom detection content, tune SIEM and IDS/IPS events, maintain SIEM content, and perform program reviews
  • Evaluate hardware/software, improve processes, manage data, coordinate incident reporting
  • Provide Tier 1 to 3 cybersecurity analysis, 24/7/365 monitoring, and incident response
  • Document events and actions, including SOC activities, IR metrics, and reports
  • Maintain a Cyber Defense Playbook and a SOC Communication Plan, updating as needed

Your tracker settings

We use cookies and similar methods to recognize visitors and remember their preferences. We also use them to measure ad campaign effectiveness, target ads and analyze site traffic. To learn more about these methods, including how to disable them, view our Cookie Policy or Privacy Policy.

By tapping `Accept`, you consent to the use of these methods by us and third parties. You can always change your tracker preferences by visiting our Cookie Policy.

logo innerThatStartupJob
Discover the best startup and their job positions, all in one place.
Copyright © 2025