TEKsystems c/o Allegis Group
Sr. SOC analyst with Security Clearance
TEKsystems c/o Allegis Group, Huntsville, Alabama, United States, 35824
Overview
We are seeking a highly experienced Senior Incident Response Analyst and Watchfloor Analyst to lead and oversee advanced incident response and watchfloor operations. This senior role requires deep expertise in detecting, analyzing, and responding to sophisticated cyber threats, with responsibilities that include mentoring junior staff and enhancing SOC processes. Key Responsibilities
Advanced Threat Monitoring and Analysis: Lead threat monitoring activities to detect and analyze complex security incidents using SIEM tools, IDS/IPS, EDR, and other advanced security platforms. Incident Response and Coordination: Direct and manage incident response actions, from identification through containment, eradication, and recovery. Mentorship and Training: Provide guidance, training, and mentorship to junior and midlevel analysts, fostering a culture of continuous improvement and knowledge sharing within the team. Threat Intelligence Application: Leverage threat intelligence sources to inform proactive threat hunting and incident analysis, maintaining awareness of evolving threat landscapes. Documentation and Process Improvement: Ensure thorough documentation of incidents and contribute to the continuous improvement of SOC playbooks and response protocols. Watchfloor Operations Leadership: Oversee shiftbased SOC operations, ensuring 24/7 coverage and adherence to established incident response procedures. CrossFunctional Collaboration: Work closely with SOC leadership, incident response teams, and threat intelligence analysts to strengthen the organization's overall security posture. Qualifications
Educational Background: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. Equivalent experience and certifications may be considered. Technical Expertise: Extensive experience with cybersecurity tools, including SIEM (e.g., Splunk, Sentinel), EDR, IDS/IPS, firewalls, and threat intelligence platforms; deep understanding of network protocols, attack vectors, and defense methodologies; advanced analytical skills for threat detection, incident response, and forensic investigation. Certifications: Highly preferred certifications include CISSP, GCIH, CISM, or CEH. Experience Level: 5+ years of experience in cybersecurity with a focus on incident response, SOC operations, or watchfloor management; demonstrated experience in shiftbased or watchfloor roles and in leading response efforts for complex security incidents. Leadership Skills: Strong leadership and mentoring abilities, with experience in training and developing junior analysts; excellent communication skills and a collaborative mindset, able to effectively engage with both technical and nontechnical teams. Work Schedule
This position requires shiftbased work as part of a 24/7 SOC team rotation, including nights, weekends, and holidays. #J-18808-Ljbffr
We are seeking a highly experienced Senior Incident Response Analyst and Watchfloor Analyst to lead and oversee advanced incident response and watchfloor operations. This senior role requires deep expertise in detecting, analyzing, and responding to sophisticated cyber threats, with responsibilities that include mentoring junior staff and enhancing SOC processes. Key Responsibilities
Advanced Threat Monitoring and Analysis: Lead threat monitoring activities to detect and analyze complex security incidents using SIEM tools, IDS/IPS, EDR, and other advanced security platforms. Incident Response and Coordination: Direct and manage incident response actions, from identification through containment, eradication, and recovery. Mentorship and Training: Provide guidance, training, and mentorship to junior and midlevel analysts, fostering a culture of continuous improvement and knowledge sharing within the team. Threat Intelligence Application: Leverage threat intelligence sources to inform proactive threat hunting and incident analysis, maintaining awareness of evolving threat landscapes. Documentation and Process Improvement: Ensure thorough documentation of incidents and contribute to the continuous improvement of SOC playbooks and response protocols. Watchfloor Operations Leadership: Oversee shiftbased SOC operations, ensuring 24/7 coverage and adherence to established incident response procedures. CrossFunctional Collaboration: Work closely with SOC leadership, incident response teams, and threat intelligence analysts to strengthen the organization's overall security posture. Qualifications
Educational Background: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. Equivalent experience and certifications may be considered. Technical Expertise: Extensive experience with cybersecurity tools, including SIEM (e.g., Splunk, Sentinel), EDR, IDS/IPS, firewalls, and threat intelligence platforms; deep understanding of network protocols, attack vectors, and defense methodologies; advanced analytical skills for threat detection, incident response, and forensic investigation. Certifications: Highly preferred certifications include CISSP, GCIH, CISM, or CEH. Experience Level: 5+ years of experience in cybersecurity with a focus on incident response, SOC operations, or watchfloor management; demonstrated experience in shiftbased or watchfloor roles and in leading response efforts for complex security incidents. Leadership Skills: Strong leadership and mentoring abilities, with experience in training and developing junior analysts; excellent communication skills and a collaborative mindset, able to effectively engage with both technical and nontechnical teams. Work Schedule
This position requires shiftbased work as part of a 24/7 SOC team rotation, including nights, weekends, and holidays. #J-18808-Ljbffr