SOC Analyst – Tier 2

Apavo CorporationArlington, VA
2dOnsite

About The Position

The SOC Analyst – Tier 2 supports the Network Operations and Security Center (NOSC) by leading the investigation and response to cybersecurity threats across multiple networks. This role is responsible for analyzing escalated incidents, mentoring junior analysts, and ensuring the effectiveness of detection and response capabilities. The position plays a key role in maintaining the security posture of critical systems while supporting mission objectives through technical expertise and collaboration.

Requirements

  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent experience)
  • 3–6 years of experience in a SOC or cybersecurity operations environment
  • DoD Top Secret Clearance with SCI/SAP eligibility required
  • Experience leading incident response efforts and mentoring junior analysts (2+ years preferred)
  • Proficiency with SIEM platforms (e.g., Splunk) and endpoint detection tools (e.g., CrowdStrike, SentinelOne, Microsoft Defender)
  • Strong understanding of network protocols, packet analysis, and tools such as Wireshark or Zeek
  • Experience with IDS/IPS/NDR/EDR tools (e.g., Snort, Suricata, Bricata)
  • Ability to analyze logs, correlate data, and identify adversary TTPs
  • Familiarity with threat intelligence frameworks such as MITRE ATT&CK and Cyber Kill Chain
  • Basic scripting or automation experience (Python, PowerShell, or Bash)
  • DoD 8140 Cyber Incident Responder Certification (Security+, CySA+, or equivalent) required

Nice To Haves

  • Preferred certifications include GCIH, GCFA, Cloud+, or GCSA

Responsibilities

  • Analyze and investigate escalated security alerts from Tier 1 analysts using SIEM, EDR, IDS/IPS, and network monitoring tools
  • Perform advanced log analysis, packet capture (PCAP) review, and endpoint investigations to determine threat scope and impact
  • Lead incident response activities and collaborate with Tier 3 analysts on high-severity or complex incidents
  • Prepare detailed incident reports, executive summaries, and deliver briefings to stakeholders and leadership
  • Collaborate with system administrators and IT teams to implement mitigation and remediation strategies
  • Mentor and provide technical guidance to Tier 1 analysts, including training on incident handling procedures
  • Assist in tuning detection tools and developing use cases for anomalous activity detection
  • Develop, update, and maintain documentation aligned with cybersecurity best practices and operational procedures
  • The SOC Analyst – Tier 2 is expected to have additional duties as assigned in support of corporate cyber security services. Additional details are reviewed in accordance with company policies.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service