Junior / Mid-Level SOC Analyst
Location
United States
Posted
4 days ago
Salary
Not specified
Job Description
Role Description
We are seeking a Junior to Mid-Level Security Operations Center (SOC) Analyst to support the National Incident and Response Team (NIRT). In this role, you will:
- Review security monitoring data and identify anomalies.
- Assist with investigating potential security incidents.
- Operate on a three 12-hour shift schedule per week on consecutive days, with occasional adjustments for team coverage.
- Work alongside one additional NIRT team member during each shift.
- Engage in a short-term engagement expected to last approximately five months, with the possibility of extension currently unknown.
Qualifications
- Bachelor's degree in Computer Science or a related discipline, with 0-2 years of experience, or
- High school diploma with 6-8 years of relevant experience, or
- Equivalent combination of education and professional experience.
- Must be able to obtain and maintain a Public Trust clearance.
- U.S. Citizenship is required.
Requirements
- Experience with SIEM tools and analyzing security events from multiple monitoring and logging systems.
- Ability to identify suspicious activity through security event analysis and correlation.
- Knowledge of TCP/IP networking protocols and network packet analysis.
- Familiarity with current cybersecurity threats, tactics, and techniques.
- Understanding of IT infrastructure and enterprise technology environments, including:
- Networking protocols
- Firewall functionality
- Host and network intrusion detection systems
- Operating systems
- Databases
- Encryption technologies
- Load balancing
- Enterprise security tools and services
Benefits
- Medical, dental, and vision coverage
- Life and disability insurance
- Additional voluntary benefits
Job Requirements
- Bachelor's degree in Computer Science or a related discipline, with 0-2 years of experience, or
- High school diploma with 6-8 years of relevant experience, or
- Equivalent combination of education and professional experience.
- Must be able to obtain and maintain a Public Trust clearance.
- U.S. Citizenship is required.
- Experience with SIEM tools and analyzing security events from multiple monitoring and logging systems.
- Ability to identify suspicious activity through security event analysis and correlation.
- Knowledge of TCP/IP networking protocols and network packet analysis.
- Familiarity with current cybersecurity threats, tactics, and techniques.
- Understanding of IT infrastructure and enterprise technology environments, including:
- Networking protocols
- Firewall functionality
- Host and network intrusion detection systems
- Operating systems
- Databases
- Encryption technologies
- Load balancing
- Enterprise security tools and services
Benefits
- Medical, dental, and vision coverage
- Life and disability insurance
- Additional voluntary benefits
Related Guides
Related Categories
Related Job Pages
More Security Analyst Jobs
As a Senior Investigator, you will investigate suspected incidents of healthcare fraud, waste, or abuse through data analysis (a high level of proficiency with Excel is required). This is not a physical investigator role. Identify, investigate, analyze and evaluate instances of p...
Support technology compliance programs at a fintech credit union.
Architects and authors System Security Plans (SSPs), the "source of truth" for the client's security posture, detailing exactly how each NIST 800-171 control is implemented. Develops and manages the Plan of Action and Milestones (POAM), tracking every deficiency and guiding the c...
Senior Principal Cybersecurity Analyst at GDIT impacting national security in cyber