IT Security Operations Analyst - Mid

DecisionPoint | CortekDC
76d

About The Position

The Government Publishing Office (GPO) SecDevOps program provides advanced security, development, and operations support to safeguard federal information systems and infrastructure. This initiative integrates cybersecurity best practices with agile development and IT operations to ensure continuous security, compliance, and resilience across GPO’s enterprise IT services. The mission is to protect and enable GPO’s digital transformation by delivering secure, scalable, and reliable IT services in alignment with federal cybersecurity mandates and operational excellence standards. DecisionPoint Corporation is seeking an IT Security Operations Analyst – Mid to support the GPO Security Operations Center (SOC) by leading incident triage, response coordination, and operational documentation. This role ensures cybersecurity threats are rapidly identified, escalated, and mitigated through standardized response procedures and collaboration with key IT stakeholders. The analyst also contributes to Risk Management Framework (RMF) artifact generation in support of audit and compliance requirements.

Requirements

  • Minimum Experience: 4 years of experience in a SOC, cybersecurity operations, or security analysis role.
  • Minimum Education: Bachelor’s degree in Computer Science, Information Systems, other related disciplines (or equivalent experience).
  • Technical Knowledge: Familiarity with RMF processes and security documentation. Hands-on experience with SIEM and EDR platforms such as Microsoft Sentinel, Defender, Trellix, or Rapid7.

Nice To Haves

  • Federal experience (preferred).
  • Certifications (preferred): CompTIA Security+, CySA+, Certified SOC Analyst (CSA), ITIL v4 Foundation.

Responsibilities

  • Serve as a front-line incident handler, performing real-time triage of security alerts from Microsoft Defender, Sentinel, Trellix, and other EDR/SIEM tools.
  • Analyze logs, network traffic, and security events to validate incidents and identify root causes.
  • Lead initial incident response actions and escalate to senior analysts or SOC leads per established playbooks.
  • Assist in the assessment, implementation, and maintenance of security measures for GPO systems in alignment with NIST SP 800-37 and SP 800-53.
  • Maintain and enhance incident response playbooks, escalation procedures, and detection logic to improve SOC efficiency.
  • Participate in operational reviews and contribute to incident after-action reports and mitigation recommendations.
  • Coordinate with ITOPS, ISSM, and engineering teams during threat response activities.
  • Create and maintain security control test results, asset inventories, and remediation documentation in GRC repositories.
  • Contribute to RMF artifact generation such as POA&Ms, data flow diagrams, and patch/upgrade schedules.
  • Ensure all documentation reflects the latest changes to production environments and security tools.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service