JPS Tech Solutions
Job Category:
Analysts
Job Type:
Hybrid
Job Location:
Seattle Washington
Compensation:
Depends on Experience
W2:
W2-Contract Only; Kindly note that applications on a C2C basis will not be considered for this role.
JPS-4454 |
Posted On : 09/10/2025 |
Closes On : 09/18/2025
Overview We are looking to hire a dynamic Junior Security Analyst to monitor technology systems for security incidents, review incident data and support the development of risk mitigation strategies and more. The Junior-level Security Analyst is expected to have 2-5 years of experience.
Responsibilities
Triages alerts/incidents and performs deep analysis; correlates with threat intelligence tools, tactics and procedures (TTP) in indicators of compromise (IOCs) to identify the threat actor, nature of the attack, and systems or data affected.
Prioritizes and triages alerts or issues to determine whether a real security incident is taking place and escalate incidents to Tier 3 if remediation cannot be closed within SLA time.
Performs analysis, triage and remediation of low/medium priority alerts.
Analyzes logs, network traffic, and other data sources to identify the source of incidents.
Records identified vulnerabilities, creates remediation tickets and tracks their status.
Builds internal scripts, tools, and automation processes to enhance detection and response capabilities.
Adjusts security tools and processes, e.g. EDR alerting modifications, updating detection rules conditions, etc.
Qualifications
Bachelor’s degree in Computer Science, Information Security, Cybersecurity, or a related field.
2-4 years of experience in one or more areas: Security Operations, Incident Response
Strong understanding of threat categories (malware, phishing, Defense-in-Depth, MITRE ATT&CK framework, etc.).
Strong knowledge of M365 Security tools, Azure, AWS, GCP
Experience with security tools such as SIEM (e.g., Sentinel, Splunk, Elastic), EDR, firewalls, IDS/IPS, anti-spam, and hardening of servers and network devices.
Strong knowledge of Windows, Linux and/or Mac OS and ability to investigate Security Event logs.
Good knowledge of networking protocols (SMTP, HTTP, HTTPS, FTP, DNS, DHCP, etc.).
Experience with query languages and scripting languages.
SharePoint, Excel, JIRA and/or Microsoft Office skills.
Experience with security orchestration, automation, and response tools.
Additional Manager Comments
Acknowledges the presence of choice in every moment and takes personal responsibility for their life.
Possesses an entrepreneurial spirit and continuously innovates to achieve great results.
Communicates with honesty and kindness and creates the space for others to do the same.
Leads with courage, knowing the possibility of greatness is bigger than the fear of failure.
Fosters connection by putting people first and building trusting relationships.
Integrates fun and joy as a way of being and working, aka doesn’t take themselves too seriously.
Seattle, WA – this role is eligible for hybrid work arrangements.
#J-18808-Ljbffr
Analysts
Job Type:
Hybrid
Job Location:
Seattle Washington
Compensation:
Depends on Experience
W2:
W2-Contract Only; Kindly note that applications on a C2C basis will not be considered for this role.
JPS-4454 |
Posted On : 09/10/2025 |
Closes On : 09/18/2025
Overview We are looking to hire a dynamic Junior Security Analyst to monitor technology systems for security incidents, review incident data and support the development of risk mitigation strategies and more. The Junior-level Security Analyst is expected to have 2-5 years of experience.
Responsibilities
Triages alerts/incidents and performs deep analysis; correlates with threat intelligence tools, tactics and procedures (TTP) in indicators of compromise (IOCs) to identify the threat actor, nature of the attack, and systems or data affected.
Prioritizes and triages alerts or issues to determine whether a real security incident is taking place and escalate incidents to Tier 3 if remediation cannot be closed within SLA time.
Performs analysis, triage and remediation of low/medium priority alerts.
Analyzes logs, network traffic, and other data sources to identify the source of incidents.
Records identified vulnerabilities, creates remediation tickets and tracks their status.
Builds internal scripts, tools, and automation processes to enhance detection and response capabilities.
Adjusts security tools and processes, e.g. EDR alerting modifications, updating detection rules conditions, etc.
Qualifications
Bachelor’s degree in Computer Science, Information Security, Cybersecurity, or a related field.
2-4 years of experience in one or more areas: Security Operations, Incident Response
Strong understanding of threat categories (malware, phishing, Defense-in-Depth, MITRE ATT&CK framework, etc.).
Strong knowledge of M365 Security tools, Azure, AWS, GCP
Experience with security tools such as SIEM (e.g., Sentinel, Splunk, Elastic), EDR, firewalls, IDS/IPS, anti-spam, and hardening of servers and network devices.
Strong knowledge of Windows, Linux and/or Mac OS and ability to investigate Security Event logs.
Good knowledge of networking protocols (SMTP, HTTP, HTTPS, FTP, DNS, DHCP, etc.).
Experience with query languages and scripting languages.
SharePoint, Excel, JIRA and/or Microsoft Office skills.
Experience with security orchestration, automation, and response tools.
Additional Manager Comments
Acknowledges the presence of choice in every moment and takes personal responsibility for their life.
Possesses an entrepreneurial spirit and continuously innovates to achieve great results.
Communicates with honesty and kindness and creates the space for others to do the same.
Leads with courage, knowing the possibility of greatness is bigger than the fear of failure.
Fosters connection by putting people first and building trusting relationships.
Integrates fun and joy as a way of being and working, aka doesn’t take themselves too seriously.
Seattle, WA – this role is eligible for hybrid work arrangements.
#J-18808-Ljbffr