Security Operations Center Analyst

Booz Allen HamiltonWashington, DC

About The Position

As a security operations center (SOC) analyst, you’re in the middle of the action, responding to and mitigating threats in real time. You’re the first line of cyber defense for your organization, and they look to you for guidance on best practices and security measures. We need a Tier 2 SOC analyst like you to help us secure critical infrastructure from the constant onslaught of cyber attacks for a federal regulatory agency. As an SOC Analyst on our team, you’ll monitor and analyze threats using state-of-the-art tools like Splunk and Microsoft Sentinel. You’ll work with the team to understand, mitigate, and respond to threats quickly, restoring operations and limiting the impact. You’ll analyze incidents to figure out just how many systems are affected and assist recovery efforts. You’ll combine threat intelligence, event data, and assessments from recent events and identify patterns to understand attackers’ goals to stop them from succeeding. This is a great opportunity to hone your cybersecurity skills with hands-on experience in threat assessment and incident response. Work with us as we secure the federal government from malicious actors. Join us. The world can’t wait.

Requirements

  • 2+ years of experience with security operations center (SOC) operations, incident response, or cyber threat intelligence
  • Experience monitoring SIEM and security tool dashboards such as Splunk or Microsoft Sentinel for alerts, anomalous activity, and potential security incidents
  • Knowledge of cyber threats, attack vectors, and incident response concepts
  • Knowledge of networking concepts such as TCP/IP, DNS, firewalls, or endpoints
  • Ability to perform initial triage and classification of security events
  • Ability to follow detailed procedures and escalation workflows
  • Ability to work in a fast‑paced SOC environment
  • Ability to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirements
  • Bachelor’s degree

Nice To Haves

  • Experience assisting with basic incident response tasks such as evidence collection, log review, and developing after‑action reports and lessons learned
  • Experience maintaining awareness of current cybersecurity threats, trends, and vulnerabilities
  • Ability to support the continuous improvement of SOC procedures and runbooks
  • Possession of excellent analytical, communication, and documentation skills
  • Industry-recognized Cybersecurity Certifications

Responsibilities

  • Monitor and analyze threats using state-of-the-art tools like Splunk and Microsoft Sentinel.
  • Work with the team to understand, mitigate, and respond to threats quickly, restoring operations and limiting the impact.
  • Analyze incidents to determine the number of affected systems and assist recovery efforts.
  • Combine threat intelligence, event data, and assessments from recent events to identify patterns and understand attackers’ goals.
  • Perform initial triage and classification of security events.
  • Follow detailed procedures and escalation workflows.

Benefits

  • health
  • life
  • disability
  • financial
  • retirement benefits
  • paid leave
  • professional development
  • tuition assistance
  • work-life programs
  • dependent care
  • recognition awards program
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service