SOC Operations Analyst

PeopleTecHuntsville, AL
Onsite

About The Position

PeopleTec is currently seeking a SOC Operations Analyst to support our Huntsville, AL location. This role is responsible for monitoring computer networks for security issues, investigating security breaches and other cybersecurity incidents, and documenting security breaches and assessing the damage they cause. The analyst will collaborate with the security team to perform tests, uncover network vulnerabilities, and implement security measures. This includes installing security software, such as firewalls and data encryption programs, and performing analysis to confirm intrusion information and create forensically sound duplicates of files. The role also involves decrypting data, providing technical summaries, examining recovered data for relevant information, and performing dynamic analysis. Additionally, the analyst will perform real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).

Requirements

  • 1 year of experience (Junior)
  • 5 years of experience (Mid)
  • 8 years of experience (Senior)
  • Splunk Enterprise Security
  • Must be willing to work a shift schedule
  • Must be a U.S. Citizen
  • An active DoD Top Secret clearance with SCI eligibility is required to perform this work.
  • Candidates are required to have an active Top Secret clearance with SCI eligibility upon hire, and the ability to maintain this level of clearance during their employment.

Nice To Haves

  • Microsoft Sentinel
  • GIAC Continuous Monitoring Certification (GMON)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Network Forensic Analyst (GNFA)

Responsibilities

  • Monitoring computer networks for security issues.
  • Investigating security breaches and other cybersecurity incidents.
  • Documenting security breaches and assessing the damage they cause.
  • Performing tests and uncovering network vulnerabilities, such as penetration testing.
  • Fixing detected vulnerabilities to maintain a high-security standard.
  • Recommending best practices for IT security.
  • Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs.
  • Conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files.
  • Decrypting data and providing technical summaries and input.
  • Examining recovered data for relevant information and performing dynamic analysis to include timeline, statistical, and file signature analysis.
  • Performing real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).

Benefits

  • Continuing-education opportunities
  • Robust training programs
  • "People First" benefits package
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service