North Carolina Staffing
Analyst Position
We are in need of bringing on an Analyst for a vacancy that will eventually lead to a full time opportunity. You will be responsible for owning day-to-day detection/response, help mature Splunk Dashboards and SOAR Automation, and drive threat-hunting insights. Key Responsibilities
Triage security tickets from ServiceNow and third-party partners; investigate, contain, and document outcomes. Perform Splunk investigations (searches, correlation, dashboards); propose/tune detections and contribute to SOAR playbooks. Conduct basic threat hunting; identify telemetry gaps (e.g., DNS, EDR, NetFlow/Plixer, Suricata) and partner with engineers to onboard data sources. Remediate common email/phishing cases; reduce false positives and alert fatigue. Coordinate with system owners, SMEs, and leadership; escalate appropriately (MFA/Duo, EDR, network). Support incident management workflows and evidence handling. Skills
Incident response, Splunk, Siem, Threat hunting, Security, Security operations Top Skills Details
Incident response, Splunk, Siem, Threat hunting Additional Skills & Qualifications
25 years in a SOC or security operations role (higher-ed or MSP acceptable). Hands-on Splunk SIEM: SPL querying, dashboards, detection tuning; exposure to SOAR is a plus. Solid fundamentals: TCP/IP, DNS/HTTP, log analysis, phishing remediation, incident handling. Experience with CrowdStrike or another EDR; ability to pivot across EDR, SIEM, and network data. Comfortable working tickets in ServiceNow (or similar) and communicating with diverse stakeholders. Nice to have: Google Workspace/Admin Console familiarity; Suricata; NetFlow/Plixer; basic scripting (Python) for automation; relevant certs (Security+, Splunk Core/Enterprise, GCIH/GCIA). Experience Level
Intermediate Level Pay and Benefits
The pay range for this position is $40.00 - $55.00/hr. Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible, the benefits available for this temporary role may include the following: Medical, dental & vision; Critical Illness, Accident, and Hospital; 401(k) Retirement Plan Pre-tax and Roth post-tax contributions available; Life Insurance (Voluntary Life & AD&D for the employee and dependents); Short and long-term disability; Health Spending Account (HSA); Transportation benefits; Employee Assistance Program; Time Off/Leave (PTO, Vacation or Sick Leave). Workplace Type
This is a hybrid position in Raleigh, NC. Application Deadline
This position is anticipated to close on Sep 29, 2025. About TEKsystems
We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company. The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
We are in need of bringing on an Analyst for a vacancy that will eventually lead to a full time opportunity. You will be responsible for owning day-to-day detection/response, help mature Splunk Dashboards and SOAR Automation, and drive threat-hunting insights. Key Responsibilities
Triage security tickets from ServiceNow and third-party partners; investigate, contain, and document outcomes. Perform Splunk investigations (searches, correlation, dashboards); propose/tune detections and contribute to SOAR playbooks. Conduct basic threat hunting; identify telemetry gaps (e.g., DNS, EDR, NetFlow/Plixer, Suricata) and partner with engineers to onboard data sources. Remediate common email/phishing cases; reduce false positives and alert fatigue. Coordinate with system owners, SMEs, and leadership; escalate appropriately (MFA/Duo, EDR, network). Support incident management workflows and evidence handling. Skills
Incident response, Splunk, Siem, Threat hunting, Security, Security operations Top Skills Details
Incident response, Splunk, Siem, Threat hunting Additional Skills & Qualifications
25 years in a SOC or security operations role (higher-ed or MSP acceptable). Hands-on Splunk SIEM: SPL querying, dashboards, detection tuning; exposure to SOAR is a plus. Solid fundamentals: TCP/IP, DNS/HTTP, log analysis, phishing remediation, incident handling. Experience with CrowdStrike or another EDR; ability to pivot across EDR, SIEM, and network data. Comfortable working tickets in ServiceNow (or similar) and communicating with diverse stakeholders. Nice to have: Google Workspace/Admin Console familiarity; Suricata; NetFlow/Plixer; basic scripting (Python) for automation; relevant certs (Security+, Splunk Core/Enterprise, GCIH/GCIA). Experience Level
Intermediate Level Pay and Benefits
The pay range for this position is $40.00 - $55.00/hr. Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible, the benefits available for this temporary role may include the following: Medical, dental & vision; Critical Illness, Accident, and Hospital; 401(k) Retirement Plan Pre-tax and Roth post-tax contributions available; Life Insurance (Voluntary Life & AD&D for the employee and dependents); Short and long-term disability; Health Spending Account (HSA); Transportation benefits; Employee Assistance Program; Time Off/Leave (PTO, Vacation or Sick Leave). Workplace Type
This is a hybrid position in Raleigh, NC. Application Deadline
This position is anticipated to close on Sep 29, 2025. About TEKsystems
We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company. The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.