SOC Analyst

TEKsystemsColumbia, SC
Remote

About The Position

This role will serve as a SOC Analyst (Consultant) within the Division of Information Security (DIS), supporting statewide security monitoring, threat detection, and incident response operations. The position focuses on day‑to‑day SOC activities, working closely with DIS security teams and state agencies to identify, investigate, and respond to security events. This position is needed to ensure the state can continuously detect, investigate, and respond to security threats in a timely manner, reducing operational and cybersecurity risk across state agencies while improving the effectiveness of centralized SOC monitoring and incident response capabilities. This is a contract role with an initial 12‑month term and the potential for extension. While remote work is supported, candidates who can provide onsite support in Columbia, South Carolina when needed will be preferred. On a daily basis, the SOC Analyst will perform continuous security monitoring and incident response activities, including reviewing, correlating, and analyzing security alerts generated by centralized security platforms. The role requires a minimum of two years of hands‑on experience supporting security incident response, including validating alerts, investigating suspicious activity, determining scope and impact, and escalating confirmed incidents when required. The analyst will apply the MITRE ATT&CK Framework to analyze adversary tactics and techniques, support detection logic, and improve understanding of attacker behavior during investigations. The SOC Analyst will also be responsible for creating and maintaining dashboards and security reports used by operational teams and leadership. This includes translating security event data into clear metrics and visualizations that highlight trends, incident activity, and overall security posture. A minimum of two years of experience with dashboard creation and security reporting is required to effectively communicate findings to both technical and non‑technical stakeholders.

Requirements

  • Minimum of two years of hands-on experience supporting security incident response.
  • Minimum of two years of experience with dashboard creation and security reporting.
  • 3+ years of experience with security monitoring and incident response
  • 3+ years of experience using the MITRE ATT&CK Framework
  • 3+ years of experience with dashboard creation and security reporting
  • Experience with the Palo Alto Cortex XSIAM / XDR platform
  • Knowledge of Linux network administration and network design
  • Experience administering firewalls, VPN technologies, Active Directory, and intrusion detection/prevention systems (IDS/IPS)
  • Experience supporting large, complex enterprise environments
  • Comfort working across multiple agencies and stakeholders
  • Willingness to support onsite work when project needs arise

Responsibilities

  • Perform continuous security monitoring and incident response activities.
  • Review, correlate, and analyze security alerts generated by centralized security platforms.
  • Validate alerts, investigate suspicious activity, determine scope and impact, and escalate confirmed incidents.
  • Apply the MITRE ATT&CK Framework to analyze adversary tactics and techniques, support detection logic, and improve understanding of attacker behavior.
  • Create and maintain dashboards and security reports used by operational teams and leadership.
  • Translate security event data into clear metrics and visualizations.
  • Support onsite work when project needs arise.

Benefits

  • Medical, dental & vision
  • Critical Illness, Accident, and Hospital
  • 401(k) Retirement Plan – Pre-tax and Roth post-tax contributions available
  • Life Insurance (Voluntary Life & AD&D for the employee and dependents)
  • Short and long-term disability
  • Health Spending Account (HSA)
  • Transportation benefits
  • Employee Assistance Program
  • Time Off/Leave (PTO, Vacation or Sick Leave)
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service