SOC Analyst
Role details
Job location
Tech stack
Job description
This role will serve as a SOC Analyst (Consultant) within the Division of Information Security (DIS), supporting statewide security monitoring, threat detection, and incident response operations. The position focuses on day-to-day SOC activities, working closely with DIS security teams and state agencies to identify, investigate, and respond to security events. This position is needed to ensure the state can continuously detect, investigate, and respond to security threats in a timely manner, reducing operational and cybersecurity risk across state agencies while improving the effectiveness of centralized SOC monitoring and incident response capabilities. This is a contract role with an initial 12-month term and the potential for extension. While remote work is supported, candidates who can provide onsite support in Columbia, South Carolina when needed will be preferred.
Requirements
On a daily basis, the SOC Analyst will perform continuous security monitoring and incident response activities, including reviewing, correlating, and analyzing security alerts generated by centralized security platforms. The role requires a minimum of two years of hands-on experience supporting security incident response, including validating alerts, investigating suspicious activity, determining scope and impact, and escalating confirmed incidents when required. The analyst will apply the MITRE ATT&CK Framework to analyze adversary tactics and techniques, support detection logic, and improve understanding of attacker behavior during investigations.
The SOC Analyst will also be responsible for creating and maintaining dashboards and security reports used by operational teams and leadership. This includes translating security event data into clear metrics and visualizations that highlight trends, incident activity, and overall security posture. A minimum of two years of experience with dashboard creation and security reporting is required to effectively communicate findings to both technical and non-technical stakeholders.
Required Skills & Qualifications
- 3+ years of experience with security monitoring and incident response
- 3+ years of experience using the MITRE ATT&CK Framework
- 3+ years of experience with dashboard creation and security reporting
- Experience with the Palo Alto Cortex XSIAM / XDR platform
- Knowledge of Linux network administration and network design
- Experience administering firewalls, VPN technologies, Active Directory, and intrusion detection/prevention systems (IDS/IPS)
- Experience supporting large, complex enterprise environments
- Comfort working across multiple agencies and stakeholders
- Willingness to support onsite work when project needs arise
Benefits & conditions
This is a Contract position based out of Columbia, SC.
Pay and Benefits
The pay range for this position is $45.00 - $60.00/hr.
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible, the benefits available for this temporary role may include the following: * Medical, dental & vision * Critical Illness, Accident, and Hospital * 401(k) Retirement Plan - Pre-tax and Roth post-tax contributions available * Life Insurance (Voluntary Life & AD&D for the employee and dependents) * Short and long-term disability * Health Spending Account (HSA) * Transportation benefits * Employee Assistance Program * Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type