SOC Analyst - Contract - Candidate is local to Columbia, SC

SUNSHINE ENTERPRISE USA LLCIrmo, SC
Remote

About The Position

Seeking an experienced Tier 2 SOC Analyst to support enterprise security monitoring, threat detection, incident response, and security investigations. This role focuses on analyzing complex security events, coordinating incident response activities, and improving SOC detection and response capabilities across a centralized security operations environment. The analyst will also engage with internal teams and state agencies to enhance adoption and effectiveness of enterprise security services.

Requirements

  • 2+ years of hands-on experience in Security monitoring and incident response
  • Strong experience in SOC operations and security event analysis
  • 2+ years of experience working with MITRE ATT&CK framework
  • 2+ years of experience working with Threat detection techniques and attack mapping
  • Experience in Dashboard creation and security reporting
  • Experience in Log analysis and correlation across security tools
  • Strong understanding of SIEM platforms
  • Strong understanding of EDR/XDR tools
  • Strong understanding of IDS/IPS systems
  • Strong understanding of Threat intelligence platforms
  • Experience in incident investigation, escalation, and root cause analysis
  • Strong knowledge of cybersecurity principles and SOC workflows

Nice To Haves

  • Hands-on experience with Palo Alto Cortex: XSIAM / XDR platform
  • Knowledge of Linux administration
  • Knowledge of Network administration and network architecture
  • Experience with Firewalls
  • Experience with VPN technologies
  • Experience with Active Directory
  • Experience with IDS/IPS systems
  • Experience in SOC automation, detection tuning, and threat hunting
  • Strong analytical and communication skills for stakeholder interaction

Responsibilities

  • Monitor, analyze, and correlate security events across SIEM platforms, EDR/XDR solutions, IDS/IPS systems, and threat intelligence feeds.
  • Investigate and validate security incidents, determine root cause, assess impact, and escalate critical issues to Tier 3 with full technical context.
  • Perform deep-dive analysis of suspicious activity including malware, phishing, and policy violations.
  • Conduct incident response activities including containment, eradication, and recovery support.
  • Develop detailed incident reports, timelines, post-incident summaries, and lessons-learned documentation.
  • Recommend improvements to SOC playbooks, detection rules, correlation logic, and alert tuning to reduce false positives and improve coverage.
  • Perform proactive threat hunting using MITRE ATT&CK framework, TTP-based analysis, and threat intelligence data.
  • Collaborate with engineering teams to tune and optimize security tools and monitoring platforms.
  • Integrate and operationalize new threat intelligence feeds into SOC workflows.
  • Support dashboard creation, reporting, and SOC performance metrics.
  • Serve as a subject matter expert (SME) interacting with stakeholders and promoting SOC service capabilities.
  • Document SOC processes, runbooks, incident handling procedures, and troubleshooting guides.
  • Coordinate with SOC teams, engineering teams, and agency stakeholders to ensure effective security operations.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service