SOC analyst

TEKSYSTEMS INC.
Huntsville, United States of America
1 month ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Shift work
Languages
English
Experience level
Junior

Job location

Huntsville, United States of America

Tech stack

Computer Security
Intrusion Detection and Prevention
Intrusion Detection Systems
Network Protocols
Security Information and Event Management
In-Plane Switching (IPS)
Cyber Threat Analysis
Firewalls (Computer Science)
Splunk

Job description

"We are seeking Junior-Level Incident Response Analysts and Watchfloor Analysts to support our cybersecurity operations. This role involves monitoring, analyzing, and responding to security incidents in real-time, ensuring the protection of critical systems.

Key Responsibilites:

  • Advanced Threat Monitoring and Analysis: Lead threat monitoring activities to detect and analyze complex security incidents using SIEM tools, IDS/IPS, EDR, and other advanced security platforms.
  • Incident Response and Coordination: Direct and manage incident response actions, from identification through containment, eradication, and recovery.
  • Threat Intelligence Application: Leverage threat intelligence sources to inform proactive threat hunting and incident analysis, maintaining awareness of evolving threat landscapes.
  • Documentation and Process Improvement: Ensure thorough documentation of incidents and contribute to the continuous improvement of SOC playbooks and response protocols.
  • Watchfloor Operations Leadership: Oversee shift-based SOC operations, ensuring 24/7 coverage and adherence to established incident response procedures.
  • Cross-Functional Collaboration: Work closely with SOC leadership, incident response teams, and threat intelligence analysts to strengthen the organization's overall security posture.

Requirements

Technical Expertise: - Extensive experience with cybersecurity tools, including SIEM (e.g., Splunk, Sentinel), EDR, IDS/IPS, firewalls, and threat intelligence platforms; - Deep understanding of network protocols, attack vectors, and defense methodologies; - Advanced analytical skills for threat detection, incident response, and forensic investigation. Certifications: - Highly preferred certifications include Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Manager (CISM), or Certified Ethical Hacker (CEH). Experience Level: - 1+ years of experience in cybersecurity with a focus on incident response, SOC operations, or watchfloor management; - Demonstrated experience in shift-based or watchfloor roles and in leading response efforts for complex security incidents. Leadership Skills: - Strong leadership and mentoring abilities, with experience in training and developing junior analysts; - Excellent communication skills and a collaborative mindset, able to effectively engage with both technical and non-technical teams.

Benefits & conditions

Work Schedule: This position requires shift-based work as part of a 24/7 SOC team rotation, including nights, weekends, and holidays. "

Apply for this position