SOC Operations Analyst

PeopleTec, Inc.
1d

About The Position

PeopleTec is currently seeking a SOC Operations Analyst to support our Huntsville, AL location. Job Functions: Responsible for monitoring computer networks for security issues. Investigating security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs. Must be capable of conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files. Decrypts data and provides technical summaries and input. Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis. Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).

Requirements

  • Junior: 1 year of experience
  • Mid: 5 years of experience
  • Senior: 8 years of experience
  • Splunk Enterprise Security
  • Must be willing to work a shift schedule
  • Must be a U.S. Citizen
  • An active DoD Top Secret clearance with SCI eligibility is required to perform this work. Candidates are required to have an active Top Secret clearance with SCI eligibility upon hire, and the ability to maintain this level of clearance during their employment.
  • BS or B.A. Degree

Nice To Haves

  • Microsoft Sentinel
  • GIAC Continuous Monitoring Certification (GMON)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Network Forensic Analyst (GNFA)

Responsibilities

  • monitoring computer networks for security issues
  • Investigating security breaches and other cybersecurity incidents
  • Document security breaches and assess the damage they cause
  • Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing
  • Fix detected vulnerabilities to maintain a high-security standard
  • Recommend best practices for IT security
  • Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs
  • conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files
  • Decrypts data and provides technical summaries and input
  • Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis
  • Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs)
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service