SOC Operations/Watch Floor Cybersecurity Analyst - Mid

TMC TechnologiesHuntsville, AL
Onsite

About The Position

TMC Technologies is in search of a mid-level Cybersecurity Analyst to join the FBI's ESOC Watch Floor Operations Team, playing a crucial role in the FBI's cybersecurity defense strategy. Operating around the clock, 24/7, 365 days a year, this dynamic team ensures the timely detection and resolution of potential security incidents, thereby minimizing the impact of cyber threats on the organization. The watch floor team is responsible for actively detecting, monitoring, preventing, and analyzing real-time cybersecurity information, events, and threats. The candidate must be a US citizen and possess a minimum of an active Top Secret clearance with Sensitive Compartmented Information (SCI) eligibility to start due to federal contract requirements. This position is in support of a newly awarded contract and requires shift work. The Watch Floor Cybersecurity Analyst - Mid will have the following responsibilities: - Responsible for monitoring computer networks for security issues. - Investigating security breaches and other cybersecurity incidents. - Document security breaches and assess the damage they cause. - Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. - Fix detected vulnerabilities to maintain a high-security standard. - Recommend best practices for IT security. - Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs. - Must be capable of conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files. - Decrypts data and provides technical summaries and input. - Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis. - Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs). SHIFTS AVAILABLE: Wed-Sat 9pm-7am

Requirements

  • US Citizenship and active Top Secret clearance with SCI eligibility required
  • Minimum of 5 years of relevant experience required
  • Bachelor’s Degree required
  • Splunk experience required

Nice To Haves

  • Experience with security information and event management (SIEM) systems preferred
  • GIAC Continuous Monitoring Certification (GMON)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Network Forensic Analyst (GNFA)
  • Microsoft Sentinel

Responsibilities

  • Monitoring computer networks for security issues.
  • Investigating security breaches and other cybersecurity incidents.
  • Documenting security breaches and assessing the damage they cause.
  • Working with the security team to perform tests and uncover network vulnerabilities, such as penetration testing.
  • Fixing detected vulnerabilities to maintain a high-security standard.
  • Recommending best practices for IT security.
  • Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs.
  • Conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files.
  • Decrypting data and providing technical summaries and input.
  • Examining recovered data for relevant information and performing dynamic analysis to include timeline, statistical, and file signature analysis.
  • Performing real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service