SOC Analyst

SAIC
3d$40,001 - $80,000Remote

About The Position

SAIC is seeking a SOC Analyst to join our team providing Security Operations Services. This position is a member of the 24x7-security operations team. Role is remote within the US Primary job responsibilities include: Provide 24x7 monitor and analysis of SIEM events to identify potential security risks and vulnerabilities Triage events and investigate to identify security incidents Log security incidents in the IT ticketing system Manage security incidents throughout their lifecycle to closure Coordinate with other, remote technical teams to investigate, document, and resolve issues Make recommendations for ongoing tuning and updates to the SIEM system Receive input from threat intelligence sources and analyze events to identify threats and risks Provide support for routine reporting Support ad-hoc data and investigation requests Conduct security and vulnerability scans as directed using established processes

Requirements

  • Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. Experience in lieu of degree will be considered
  • Four (4) years' experience; Experience and with relevant certification(s) in lieu of education will be considered
  • Minimum of 1 year of experience in a SOC environment or a related cybersecurity role is desired.
  • 2+ years in an IT role
  • Relevant cybersecurity experience including SIEM operations, event management and incident management or relevant cyber certifications and training in lieu of experience
  • Excellent oral and written communication skills
  • Experience with Microsoft Office including Word and PowerPoint
  • Must be able to obtain a public trust, United States citizenship required

Nice To Haves

  • Experience with ITIL, ITIL certification
  • Cybersecurity certification (e.g. CompTIA Security+, CISSP, CEH, etc.)
  • Experience with SIEM tools (Splunk)
  • Experience with reporting and reporting tools

Responsibilities

  • Provide 24x7 monitor and analysis of SIEM events to identify potential security risks and vulnerabilities
  • Triage events and investigate to identify security incidents
  • Log security incidents in the IT ticketing system
  • Manage security incidents throughout their lifecycle to closure
  • Coordinate with other, remote technical teams to investigate, document, and resolve issues
  • Make recommendations for ongoing tuning and updates to the SIEM system
  • Receive input from threat intelligence sources and analyze events to identify threats and risks
  • Provide support for routine reporting
  • Support ad-hoc data and investigation requests
  • Conduct security and vulnerability scans as directed using established processes
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service