Security Operations Analyst

Core-CSI.Washington, DC
Onsite

About The Position

The Security Operations Analyst must provide a senior security analysis who will perform activities as follows with minimal supervision and guidance. Duties include: Perform all security analysis activities according to established standards. Maintain threat awareness and monitor NIGC information systems for exploits and any suspicious activities; analyze aggregated logs and reports from security tools. Develop a daily security analysis and reporting checklist and execute activities identified in the checklist. Evaluate effectiveness of security analysis activities compared to best practices and recommend improvements. Adhere to Continuous Monitoring practices to evaluate the effectiveness of implemented security controls and execute proactive threat hunting activities to ensure confidentiality, integrity, and availability of NIGC information systems. Develop detection and response configuration policies to increase automation and alerting. Develop Incident handling procedures. Execute Incident Response activities to include all associated actions according to the NIGC incident response plan. Validate that sufficient and relevant information is captured and retained from security tools to support actionable security awareness and incident investigations.

Requirements

  • Bachelor's degree in a related field (or equivalent relevant IT certifications in lieu of a degree).
  • Demonstrated hands-on experience performing the responsibilities outlined above is required.
  • Minimum of six (6) years of continuous, relevant cybersecurity operations experience.
  • Eligible to obtain and maintain a Public Trust clearance.

Responsibilities

  • Perform all security analysis activities according to established standards.
  • Maintain threat awareness and monitor NIGC information systems for exploits and any suspicious activities.
  • Analyze aggregated logs and reports from security tools.
  • Develop a daily security analysis and reporting checklist and execute activities identified in the checklist.
  • Evaluate effectiveness of security analysis activities compared to best practices and recommend improvements.
  • Adhere to Continuous Monitoring practices to evaluate the effectiveness of implemented security controls.
  • Execute proactive threat hunting activities to ensure confidentiality, integrity, and availability of NIGC information systems.
  • Develop detection and response configuration policies to increase automation and alerting.
  • Develop Incident handling procedures.
  • Execute Incident Response activities to include all associated actions according to the NIGC incident response plan.
  • Validate that sufficient and relevant information is captured and retained from security tools to support actionable security awareness and incident investigations.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service