SOC Analyst [JOB ID 20260420]

Phoenix CyberPhoenix, AZ
Onsite

About The Position

Phoenix Cyber is seeking SOC Analysts to join their client delivery team. This role is an onsite, shift-work position located at a client site in Chandler, AZ, and includes some overnight work. Responsibilities involve monitoring and analyzing network traffic, Intrusion Detection Systems (IDS), security events, and logs, as well as prioritizing potential intrusion attempts versus false alarms. Analysts will develop, maintain, and adhere to SOC Standard Operating Procedures (SOPs), support daily and monthly situation reporting, and proactively review large datasets for anomalous activity. The position also requires creating detective content for monitoring devices like IDS and SIEM, advising on proactive security blocks, managing security investigations to resolution, composing security alert notifications, and advising incident responders. Staying current with vulnerabilities, attacks, and countermeasures is also a key aspect of the role. Phoenix Cyber is a national provider of cybersecurity engineering, operations, sustainment, and managed security services, dedicated to strengthening organizational security postures and enhancing security operations processes and technology.

Requirements

  • Must be a U.S. Citizen
  • High school diploma or GED
  • Two (2) years’ experience in security
  • Experience in handling incident response
  • Certified Ethical Hacking (CEH) certification or CompTIA CySA+ AND (within 6 months of hire) any from the CSSP Analyst, Infrastructure Support, or IR from the DOD 8570 list (or other similar certifications as approved by Government)
  • Secret Clearance (active)

Responsibilities

  • Monitor and analyze network traffic, Intrusion Detection Systems (IDS), security events and logs
  • Prioritize and differentiate between potential intrusion attempts and false alarms
  • Develop, maintain, and follow SOC Standard Operating Procedures (SOPs)
  • Support daily and monthly situation reporting per shift
  • Proactively review large data sets for anomalous activity
  • Create detective content for monitoring devices such as IDS and SIEM and advise on proactive blocks for security architecture
  • Create and track security investigations to resolution
  • Compose security alert notifications and other communications
  • Advise incident responders on the steps to take to investigate and resolve computer security incidents
  • Stay up to date with current vulnerabilities, attacks, and countermeasures
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service