SOC Security Analyst Tier 1

Are you an accomplished Information Security expert and have experience in IT security and security controls?

Do you desire to be a valued member of a team delivering high-end IT services and consulting for a cabinet-level Federal Government agency?

Hill Associates is searching for a SOC Security Analyst Tier 1  Provides hands-on technical expertise and is engaged in ensuring the confidentiality, integrity, availability, and non-repudiation of all IT systems operated by or on behalf of the Department of the Treasury. Whoever is selected for this position will assist in efforts to plan, develop, and oversee security aspects of multiple concurrent vital IT programs for Infrastructure Operations (IO); will perform against goals set by federal and contract management, and be expected to perform assigned duties with a high degree of independence.

What You Get To Do:

As a member of the IO SecOps team, some of your typical work assignments may include:

  • Provides technical expertise to the Security Operations (SecOps) team with respect to technical execution of daily workloads.
  •  Maintains hands-on operational, technical, and situational awareness of the planning and execution of multiple, concurrent computer SecOps activities of a Federal Agency
  • Identifies relevant cyber threat trends, Tactics, Techniques, and Procedures (TTPs), and cyber tool developments.
  •  Provides risk analysis recommendations and mitigation strategies on the safe and effective execution of SecOps operations.
  • Participates in the development of products, reports, and briefings for senior Treasury officials and customers explaining complex, technical findings and the strategic implications of vulnerabilities identified.
  • SOC Analysts serve as mid to senior-level Subject Matter Expert (SME) on technical operations across the operational lifecycle of in-scope systems.
  • Provides mentoring and professional guidance\development to SecOps team members (skills sharing).
  • Create and update daily\weekly\monthly standard operating procedures as necessary
  • Participate in incident response activities as needed for systems and services within scope.
  • Participate in vulnerability management activities for systems and services within scope.
  • Undergoes required security training and development opportunities for the organization as assigned by management.
  • Performs analysis, reporting, and remediation (plan of action and milestones) of security incidents, threat assessments, and findings from audits, testing, and other sources to the assigned infrastructure and in-scope systems.
  • Ensures the consistency in individual work outcomes, and adequacy, and contributes to the success of the programs by consistently following established operational processes, procedures, and mechanisms for securely managing information systems security.
  • Identifies the need for system changes based on new security technologies or threats; reviews proposed new systems, networks, and software designs for potential security risks; and assists in the development of long-range plans for IT security systems that anticipate, identify, evaluate, mitigate, and minimize risks associated with IT systems vulnerabilities.
  •  Participates in systems security evaluations, audits, and reviews; participates in network and systems design to ensure implementation of appropriate systems security policies.
  • Provides expert technical advice, guidance, and recommendations to management and other technical specialists on compliance with Treasury’s security program, monitoring, and improvement of its security posture.
  • Consults with customers to evaluate functional requirements; coordinates with systems architects and developers to provide oversight in the development of IT design solutions.
  •  Identifies issues, impediments, and obstacles to achieving IT security goals and program success and provides potential solutions to management.
  • Assists in the development of policies, procedures, and strategies to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to Treasury systems and digital services offered by the government to the Department and its Bureaus, the general public, other agencies, and business entities in the public and private sector.
  •  Serves as a subject matter expert on high-level information technology issues related to security for personally identifiable information, sensitive but unclassified controlled unclassified information, classified information, as well as information privacy concerns as required.
  • Participates in efforts to address issues with IT security where precedents do not exist and that require the development of new concepts and approaches to determine the acceptability of these new approaches.
  • Serves as subject matter expert for a diverse range of issues related to IT security, technology, digital service delivery, and or technology policy, as well as more widespread issues affecting the substantive office’s mission in one or more areas.
  • Participates in technology initiatives or technology policy initiatives across the government, promoting the integration of secure digital applications, standards-based approaches to secure development, and modern project management and development processes.
  • Participates in and drives the adoption and creation of government-wide standards for developing digital services, based upon best practices from the private sector such as agile development methodologies and open-source practices.
  • Uses technical expertise, creativity, and judgment, to develop, define, and lead the integration of IT security into all aspects of software development, operations, and maintenance, devising innovative ways to solve problems of major importance. Reviews related security initiatives for technical and programmatic feasibility and adherence with the organization’s and federal standards, regulations, and policies dealing with customer perspective on technology.
  • Utilizes Digital Analytics (qualitative and quantitative measurements of application system website data), in order to improve IT security and balance the customer experience across component areas. The incumbent conducts sophisticated research using quantitative and qualitative methods.
  • Conducts systems security evaluations, audits, and reviews. Gathers and analyzes findings; organizes documentation, consults with systems users, and develops recommendations used to identify and define systems security requirements.
  •  Monitors application of approved security procedures by systems users.
  • Develops, recommends, and implements approved security contingency plans, incident response plans, and disaster recovery procedures.
  • Maintains comprehensive knowledge of new technology and other developments in the field of information technology and cybersecurity. Instructs seniors, peers, and junior employees on new information and trends.

You Will Bring These Qualifications:

  • BS in Engineering, Cybersecurity, Information Technology, Computer Science, or equivalent.
  • 10 years of professional work experience, with 5 years of related experience in IT security, with knowledge of standard IT security best practices.
  • Excellent interpersonal and communications skills for interaction with customers, project leaders, team members, and other government agencies.
  • Ability to capture high-level technical information in a clear, concise manner.
  • Ability to think creatively and adapt creative thinking to what works for the organization.
  • U.S. Citizen.
  • Active US Government Clearance at the Secret level or higher is a MUST.
  • Exceptional organizational and time-management skills.
  • Experience working with and in Government projects desired.

What We Can Offer You:

Hill Associates is an affirmative action and equal opportunity, employer. Employment decisions will be made without regard to race, color, religion, sex, age, national origin, military status, veteran status, handicap, physical or mental disability, sexual orientation, gender identity, genetic information, or other characteristics protected by law.

If you have visited our website for information about employment opportunities, or to apply for a position, and you require accommodation, please contact Hill Associates Recruiting Team at 202-656-6505 or via email at All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodation.

Hill Associates offers a comprehensive, total rewards package that includes competitive compensation and a flexible benefits package that reflects our commitment to creating a diverse and supportive workplace.