Security Operations Analyst

Plante MoranSouthfield, MI
$68,000 - $110,000Hybrid

About The Position

The Security Operations Analyst supports day-to-day cybersecurity operations and helps mature the firm’s security program. Reporting to the Cybersecurity Operations Manager, this entry-level role provides hands-on experience across SOC processes, identity and access management (IAM), cloud security, and endpoint protection. You will learn SOC tools and workflows and support operations by triaging alerts, validating events, and escalating incidents using established playbooks.

Requirements

  • Bachelor’s degree in Information Systems, Cybersecurity, Computer Science, or related field preferred; or 2–5 years of relevant experience.
  • 1–3 years of experience or equivalent exposure (internships, military, or hands-on training) in one or more: SOC, incident response, IAM, or endpoint/network/application security.
  • Exposure to one or more: SIEM; EDR/next-generation antivirus; email/phishing security; IAM solutions; vulnerability management or threat intelligence tools.
  • Foundational understanding of security and networking concepts, including DNS, TCP/IP, SMTP, and HTTP.
  • Familiarity with frameworks/standards such as NIST CSF, CIS Benchmarks, and MITRE ATT&CK.
  • Basic understanding of malware distribution, technical risk, and containment/mitigation techniques.
  • Ability to prioritize and manage tasks based on intake queues and service level agreements (SLAs).
  • Strong written and verbal communication skills across varying levels of the organization.
  • Demonstrated integrity, accountability, and pride in quality work.
  • Curiosity, adaptability, and a strong desire to learn

Nice To Haves

  • Knowledge of Microsoft security tools and practices is a plus.
  • Experience with scripting or automation (e.g., Python, PowerShell) is a plus.

Responsibilities

  • Support Level 1 requests across SOC, IAM, and cloud security (e.g., software/blocked URL requests, DLP requests, client VPN/network app troubleshooting, and group/service account changes).
  • Investigate Tier 1 incidents (e.g., phishing reports, malware detections, failed authentications, and policy violations) and escalate as needed.
  • Monitor, triage, and validate security alerts across multiple systems and platforms using established SOC procedures.
  • Partner with incident responders during investigations and escalate to senior analysts or management as required.
  • Create, update, and maintain incident tickets with clear documentation, evidence, and findings.
  • Assist with maintaining and improving standard operating procedure (SOP) playbooks and security documentation.
  • Document investigation outcomes and contribute to reports that help improve the organization’s security posture.
  • Stay current on emerging threats, vulnerabilities, and security best practices.
  • Collaborate with cybersecurity, IT, and internal teams to support security operations.
  • Other duties as assigned.

Benefits

  • health, dental, vision, disability, and life insurance
  • Flexible Time Off and various pre-determined holidays
  • 401(k) plan
  • flexible benefits plans
  • business-related travel expense, lodging, and meal reimbursement for business-related use
  • A pension plan is also available for eligible administrative and paraprofessional staff.
  • A discretionary bonus plan is available for eligible staff.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service