Logo
Falcon IT & Staffing Solutions

Mid-Level SOC Operations Analyst / Watch Floor Operations

Falcon IT & Staffing Solutions, Huntsville, Alabama, United States, 35824

Save Job

Application

About the Role

Seeking a skilled SOC Operations Analyst to join a high-performing cyber team supporting a large SOC enterprise environment in Huntsville, AL. The ideal candidate will have a strong background in cybersecurity monitoring, incident response, and vulnerability management, with a Top Secret clearance or the ability to obtain one. This role offers the opportunity to work on critical defensive cyber operations and contribute to maintaining high-security standards in a dynamic environment. SOC Operations Analyst/Watch-Floor Operations. Ten-hour day shifts are listed below. SHIFTS AVAILABLE: Sun-Wed 12 pm-10 pm Wed-Sat 12 pm-10 pm Wed-Sat 9 pm-7 am

Job Responsibilities

Monitor computer networks for security issues and potential breaches. Investigate and document security incidents and assess their impact. Perform penetration testing and identify network vulnerabilities. Implement security measures, including firewalls and data encryption. Conduct forensic analysis and create forensically sound duplicates of files. Decrypt data and provide technical summaries and input. Perform dynamic analysis, including timeline, statistical, and file signature analysis. Support deployable Incident Response Teams with real-time cyber defense tasks. Recommend and implement best practices for IT security. Required Skills

Splunk Enterprise Security Network Security Monitoring Incident Response Penetration Testing Forensic Analysis Data Encryption Firewall Management Cyber Defense Security Incident Documentation

Preferred Skills

Microsoft Sentinel GIAC Continuous Monitoring (GMON) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA)

Job Requirements

Possess a Top Secret security clearance or ability to obtain one with CI Polygraph eligibility. Bachelor's degree in a relevant field such as Computer Science, Cybersecurity, or Information Technology. Minimum of 5 years of experience in cybersecurity operations, including experience with Splunk Enterprise Security. Proven ability to monitor networks, investigate security breaches, and document cybersecurity incidents. Strong analytical skills to conduct forensic analysis and dynamic data examination. Experience with penetration testing and vulnerability remediation. Excellent communication skills and ability to work collaboratively in a team environment. Ability to perform real-time cyber defense and support Incident Response Teams. Commitment to following best practices for IT security and maintaining high-security standards.

Education Requirements

Degree: Bachelor

Major: Computer Science