Security Operations Center Analyst, Mid

Booz Allen HamiltonWashington, DC

About The Position

As a security operations center (SOC) analyst, you’re in the middle of the action, responding to and mitigating threats in real time. You’re the first line of cyber defense for your organization, and they look to you for guidance on best practices and security measures. We need a Tier 2 SOC analyst like you to help us secure critical infrastructure from the constant onslaught of cyber attacks for a federal regulatory agency. As a SOC analyst on our team, you’ll monitor and analyze threats, using state-of-the-art tools like Splunk and Microsoft Sentinel. You’ll work with the team to understand, mitigate, and respond to threats quickly, restoring operations and limiting the impact. You’ll analyze incidents to figure out just how many systems are affected and assist recovery efforts. You’ll combine threat intelligence, event data, and assessments from recent events, and identify patterns to understand attackers’ goals to stop them from succeeding. This is a great opportunity to hone your cyber security skills with hands on experience in threat assessment and incident response. Join us. The world can’t wait.

Requirements

  • 2+ years of experience with SOC operations, incident response, or cyber threat intelligence
  • Experience monitoring SIEM and security tool dashboards, such as Splunk or Microsoft Sentinel, for alerts, anomalous activity, and potential security incidents
  • Knowledge of cyber threats, attack vectors, and incident response concepts
  • Knowledge of networking concepts, such as TCP/IP, DNS, firewalls, and endpoints
  • Ability to perform initial triage and classification of security events
  • Ability to follow detailed procedures and escalation workflows
  • Ability to work in a fast‑paced, SOC environment
  • Ability to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirements
  • Bachelor’s degree

Nice To Haves

  • Experience assisting with basic incident response tasks, such as evidence collection, log review, and developing after‑action reports and lessons learned
  • Experience maintaining awareness of current cybersecurity threats, trends, and vulnerabilities
  • Ability to support the continuous improvement of SOC procedures and runbooks
  • Possession of strong analytical, communication, and documentation skills
  • Industry recognized cybersecurity certifications

Responsibilities

  • Monitor and analyze threats using tools like Splunk and Microsoft Sentinel.
  • Understand, mitigate, and respond to threats quickly.
  • Restore operations and limit the impact of cyber attacks.
  • Analyze incidents to determine the number of affected systems.
  • Assist with recovery efforts.
  • Combine threat intelligence, event data, and assessments from recent events.
  • Identify patterns to understand attackers’ goals and prevent their success.

Benefits

  • health, life, disability, financial, and retirement benefits
  • paid leave
  • professional development
  • tuition assistance
  • work-life programs
  • dependent care
  • recognition awards program
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service