SOC Operations Analyst

PeopleTec, Inc.
Onsite

About The Position

PeopleTec is currently seeking a SOC Operations Analyst to support our Huntsville, AL location. This role is responsible for monitoring computer networks for security issues, investigating security breaches and other cybersecurity incidents, and documenting security breaches and assessing the damage they cause. The analyst will work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing, and fix detected vulnerabilities to maintain a high-security standard. Additionally, the role involves recommending best practices for IT security, installing security measures, and operating software to protect systems and information infrastructure, including firewalls and data encryption programs. The analyst must be capable of conducting analysis, confirming intrusion information, and creating a forensically sound duplicate of the files. This includes decrypting data, providing technical summaries and input, examining recovered data for relevant information, and performing dynamic analysis such as timeline, statistical, and file signature analysis. The position also requires performing real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).

Requirements

  • 1 year of experience (Junior)
  • 5 years of experience (Mid)
  • 8 years of experience (Senior)
  • Splunk Enterprise Security
  • Willingness to work a shift schedule
  • Must be a U.S. Citizen
  • Active DoD Top Secret clearance with SCI eligibility is required to perform this work.
  • Ability to maintain an active Top Secret clearance with SCI eligibility during employment.

Nice To Haves

  • Microsoft Sentinel
  • GIAC Continuous Monitoring Certification (GMON)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Network Forensic Analyst (GNFA)

Responsibilities

  • Monitoring computer networks for security issues.
  • Investigating security breaches and other cybersecurity incidents.
  • Documenting security breaches and assessing the damage they cause.
  • Performing tests and uncovering network vulnerabilities, such as penetration testing.
  • Fixing detected vulnerabilities to maintain a high-security standard.
  • Recommending best practices for IT security.
  • Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs.
  • Conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files.
  • Decrypting data and providing technical summaries and input.
  • Examining recovered data for relevant information and performing dynamic analysis to include timeline, statistical, and file signature analysis.
  • Performing real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).

Benefits

  • Continuing-education opportunities
  • Robust training programs
  • "People First" benefits package
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service