Security Operations Analyst (SR)

QED NationalHuntsville, AL
35d$85,000 - $90,000Onsite

About The Position

We are seeking a highly skilled Security Operations Analyst to join an onsite cybersecurity team in Huntsville, AL. This role is ideal for a seasoned security professional who thrives in fast-paced, mission-critical environments and is passionate about defending complex enterprise networks from advanced cyber threats. In this position, you will play a key role in incident response, threat detection, cyber defense operations, and continuous monitoring. You will apply advanced cybersecurity principles, work on highly complex challenges, and contribute to the development of innovative defense strategies. This role offers substantial autonomy and the opportunity to mentor junior team members while influencing security operations at scale.

Requirements

  • 5+ years of experience in Information Technology, Cybersecurity, or Intelligence Operations.
  • Strong background supporting Computer Incident Response Teams, Cyber Network Operations, or a Security Operations Center (SOC).
  • Hands-on experience with SIEM, threat detection, and incident response tools and technologies.
  • Proficiency in industry-standard security frameworks and models, including: MITRE ATT&CK Cyber Kill Chain Intelligence-Driven Defense
  • Knowledge of best practices for incident response and SOC operations.
  • Understanding of intrusion set tactics, techniques, and procedures (TTPs).
  • Bachelor's degree in Cybersecurity, Information Technology, or related field.
  • Active Top Secret clearance required.

Nice To Haves

  • Experience with Microsoft Sentinel, Splunk, or other enterprise SIEM platforms.
  • TS/SCI clearance with polygraph.
  • One or more GIAC certifications such as: GMON, GCIH, GCFA, GCIA, GNFA, GCTD, or GCFR.

Responsibilities

  • Respond to, investigate, and resolve cybersecurity incidents across a large enterprise environment.
  • Conduct root-cause analysis and develop strategies to prevent incident recurrence.
  • Utilize frameworks such as MITRE ATT&CK, Cyber Kill Chain, and intelligence-driven defense methodologies.
  • Analyze intrusion sets, threat actor TTPs, and other indicators of compromise.
  • Leverage SIEM/SOAR platforms and security tools (e.g., Microsoft Sentinel, Splunk) to detect and correlate security events.
  • Develop and refine incident response processes, playbooks, and best practices.
  • Collaborate with cross-functional teams to strengthen the organization's overall security posture.
  • Provide mentorship and leadership to less experienced analysts as needed.

Benefits

  • competitive pay
  • comprehensive health, dental, and vision coverage
  • 401(k) retirement plans
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service