SOC Analyst
Company: Hatch IT
Location: Washington
Posted on: February 16, 2026
|
|
|
Job Description:
Job Description Job Description hatch I.T. is partnering with
Expression to find a SOC Analyst . See details below: About The
Role: Expression is seeking a SOC Analyst to join their team in
support of the National Telecommunications and Information
Administration (NTIA) ISCOM Division. In this role, you will
provide cyber threat monitoring, analysis, and incident response
support that strengthens program situational awareness and ensures
resilience of critical federal networks. You will support Tier 1
and Tier 2 SOC operations, contribute to SOC playbook development,
and help mature cyber defense strategies in a mission-focused
environment. About the Company: Founded in 1997 and headquartered
in Washington DC, Expression provides data fusion, data analytics,
software engineering, information technology, and electromagnetic
spectrum management solutions to the U.S. Department of Defense,
Department of State, and national security community. Expression’s
“Perpetual Innovation” culture focuses on creating immediate and
sustainable value for their clients via agile delivery of tailored
solutions built through constant engagement with their clients.
Expression was ranked 1 on the Washington Technology 2018's Fast 50
list of fastest growing small business Government contractors and a
Top 20 Big Data Solutions Provider by CIO Review. Responsibilities:
Monitor, detect, and analyze security threats, risks, and alerts
using SOC tools, and initiate escalation as required. Conduct cyber
threat analysis and contribute to reports for program situational
awareness. Provide Tier 1 response to security incidents and
support escalation to Tier 2 during high-volume or critical events.
Conduct functional incident response teams during shifts, ensuring
accountability and effective resolution. Conduct malware analysis
(static and dynamic) and assess Indicators of Compromise (IOCs).
Perform network forensics and deep packet inspection to investigate
intrusions. Implement remediation strategies and support recovery
activities after incidents. Recommend process improvements and
create new detection content to strengthen SOC operations. Conduct
proactive monthly threat hunts and provide reports to stakeholders.
Collaborate with cyber teams for incident escalation, coordinated
responses, and SOC policy/procedure development. Qualifications:
Bachelor’s degree in Cybersecurity, Computer Science, Information
Systems, or related field; OR equivalent certifications (CompTIA
Security, CISSP, GCIH, GCIA). Minimum of 4 years of experience in
security operations, incident response, or cyber threat analysis.
Strong knowledge of SOC operations, incident detection, and
response workflows. Familiarity with malware analysis, network
forensics, and packet-level inspection. Excellent analytical,
problem-solving, and communication skills. Preferred Experience:
Advanced certifications such as CISSP, GCFA, GCIH, GCIA, or
equivalent. Prior experience supporting NTIA, Department of
Commerce, or other federal civilian agencies. Hands-on experience
with SIEM platforms, IDS/IPS, and endpoint monitoring tools.
Familiarity with the NIST Cybersecurity Framework and Risk
Management Framework (RMF). Experience developing and maturing SOC
playbooks, processes, and detection capabilities. We may use
artificial intelligence (AI) tools to support parts of the hiring
process, such as reviewing applications, analyzing resumes, or
assessing responses. These tools assist our recruitment team but do
not replace human judgment. Final hiring decisions are ultimately
made by humans. If you would like more information about how your
data is processed, please contact us.
Keywords: Hatch IT, Catonsville , SOC Analyst, IT / Software / Systems , Washington, Maryland