TEKsystems c/o Allegis Group
SOC analyst with Security Clearance
TEKsystems c/o Allegis Group, Huntsville, Alabama, United States, 35824
Overview
We are seeking JuniorLevel Incident Response Analysts and Watchfloor Analysts to support our cybersecurity operations. This role involves monitoring, analyzing, and responding to security incidents in realtime, ensuring the protection of critical systems. Responsibilities
Advanced Threat Monitoring and Analysis: Lead threat monitoring activities to detect and analyze complex security incidents using SIEM tools, IDS/IPS, EDR, and other advanced security platforms. Incident Response and Coordination: Direct and manage incident response actions, from identification through containment, eradication, and recovery. Threat Intelligence Application: Leverage threat intelligence sources to inform proactive threat hunting and incident analysis, maintaining awareness of evolving threat landscapes. Documentation and Process Improvement: Ensure thorough documentation of incidents and contribute to the continuous improvement of SOC playbooks and response protocols. Watchfloor Operations Leadership: Oversee shiftbased SOC operations, ensuring 24/7 coverage and adherence to established incident response procedures. CrossFunctional Collaboration: Work closely with SOC leadership, incident response teams, and threat intelligence analysts to strengthen the organization's overall security posture. Qualifications
Technical Expertise: Extensive experience with cybersecurity tools, including SIEM (e.g., Splunk, Sentinel), EDR, IDS/IPS, firewalls, and threat intelligence platforms; deep understanding of network protocols, attack vectors, and defense methodologies; advanced analytical skills for threat detection, incident response, and forensic investigation. Certifications: Highly preferred certifications include Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Manager (CISM), or Certified Ethical Hacker (CEH). Experience Level: 1+ years of experience in cybersecurity with a focus on incident response, SOC operations, or watchfloor management; demonstrated experience in shiftbased or watchfloor roles and in leading response efforts for complex security incidents. Leadership Skills: Strong leadership and mentoring abilities, with experience in training and developing junior analysts; excellent communication skills and a collaborative mindset, able to effectively engage with both technical and nontechnical teams. Work Schedule
This position requires shiftbased work as part of a 24/7 SOC team rotation, including nights, weekends, and holidays. #J-18808-Ljbffr
We are seeking JuniorLevel Incident Response Analysts and Watchfloor Analysts to support our cybersecurity operations. This role involves monitoring, analyzing, and responding to security incidents in realtime, ensuring the protection of critical systems. Responsibilities
Advanced Threat Monitoring and Analysis: Lead threat monitoring activities to detect and analyze complex security incidents using SIEM tools, IDS/IPS, EDR, and other advanced security platforms. Incident Response and Coordination: Direct and manage incident response actions, from identification through containment, eradication, and recovery. Threat Intelligence Application: Leverage threat intelligence sources to inform proactive threat hunting and incident analysis, maintaining awareness of evolving threat landscapes. Documentation and Process Improvement: Ensure thorough documentation of incidents and contribute to the continuous improvement of SOC playbooks and response protocols. Watchfloor Operations Leadership: Oversee shiftbased SOC operations, ensuring 24/7 coverage and adherence to established incident response procedures. CrossFunctional Collaboration: Work closely with SOC leadership, incident response teams, and threat intelligence analysts to strengthen the organization's overall security posture. Qualifications
Technical Expertise: Extensive experience with cybersecurity tools, including SIEM (e.g., Splunk, Sentinel), EDR, IDS/IPS, firewalls, and threat intelligence platforms; deep understanding of network protocols, attack vectors, and defense methodologies; advanced analytical skills for threat detection, incident response, and forensic investigation. Certifications: Highly preferred certifications include Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Manager (CISM), or Certified Ethical Hacker (CEH). Experience Level: 1+ years of experience in cybersecurity with a focus on incident response, SOC operations, or watchfloor management; demonstrated experience in shiftbased or watchfloor roles and in leading response efforts for complex security incidents. Leadership Skills: Strong leadership and mentoring abilities, with experience in training and developing junior analysts; excellent communication skills and a collaborative mindset, able to effectively engage with both technical and nontechnical teams. Work Schedule
This position requires shiftbased work as part of a 24/7 SOC team rotation, including nights, weekends, and holidays. #J-18808-Ljbffr