VetJobs
Get AI-powered advice on this job and more exclusive features.
ATTENTION MILITARY AFFILIATED JOB SEEKERS - Our organization works with partner companies to source qualified talent for their open roles. The following position is available to Veterans, Transitioning Military, National Guard and Reserve Members, Military Spouses, Wounded Warriors, and their Caregivers. If you have the required skill set, education requirements, and experience, please click the submit button and follow the next steps. All positions are onsite, unless otherwise stated.
SOC Analyst
Position:
Security Operations Center (SOC) Analyst Department:
Information Security Location:
On-site Oradell NJ Employment Type:
Full-time-40/Hr/Week Shifts: We operate 24 x 7 x 365 with shifts of 7AM-3PM ,9am-5PM, 10AM-6PM, 11AM-7 PM, 3-11PM, 4PM-12AM, 1AM-9AM Role Overview
The SOC Analyst is responsible for monitoring, detecting, analyzing, and responding to cybersecurity threats across the organization. This role combines technical expertise, analytical thinking, and strong communication skills to ensure the continuous protection of corporate information systems. The ideal candidate has experience with SIEM platforms, endpoint security tools, XDR solutions, and open-source security technologies. Key Responsibilities
Threat Monitoring & Detection:
Continuously monitor security events and alerts generated by SIEM platforms and XDR tools. Review and triage alerts from Splunk, openXDR, CrowdStrike Falcon, and other security tools. Identify indicators of compromise (IOCs) and abnormal activity across logs, endpoints, and networks.
Incident Response:
Investigate security incidents, assess severity, and initiate timely response actions. Perform root-cause analysis and document findings with actionable remediation guidance. Escalate high-impact incidents to senior analysts or incident response teams as required.
Log & Event Analysis:
Analyze logs from firewalls, servers, endpoints, cloud services, and security appliances. Tune SIEM and XDR rules to reduce false positives and improve detection capability. Maintain visibility across multi-platform environments using Splunk, CrowdStrike, and openXDR.
Security Operations & Maintenance:
Support the configuration and administration of SIEM and XDR systems. Contribute to detection engineering efforts, including creating new correlation rules and dashboards. Assist in maintaining threat intelligence feeds and updating detection indicators.
Reporting & Documentation:
Prepare incident reports, summaries, and metrics for leadership and compliance needs. Maintain runbooks, SOPs, and knowledge base material for SOC activities. Participate in compliance, auditing, and security policy enforcement efforts.
Required Skills & Qualifications
1–3 years of experience in a SOC environment or similar security-focused role. Hands‑on experience with SIEM platforms (e.g., Splunk, Elastic, QRadar, Azure Sentinel). Proficiency with:
Splunk (log collection, agent management, rule customization) openXDR platforms (threat detection, correlation, automated response) CrowdStrike Falcon (EDR monitoring, threat hunting, incident triage)
Strong understanding of networking, Linux/Windows OS internals, and security best practices. Knowledge of MITRE ATT&CK framework and common adversary techniques. Ability to analyze complex datasets and detect patterns indicative of malicious activity. Excellent communication and documentation skills. Preferred Qualifications
Security certifications such as Security+, CySA+, CEH, GCIA, or GCIH. Experience with scripting (Python, Bash, PowerShell) for automation. Familiarity with cloud security (AWS, Azure, GCP). Experience with threat hunting and detection engineering. Soft Skills
Strong analytical and problem‑solving abilities. Ability to work under pressure during active incidents. Additional Information
Minimum Education Required:
High School/GED Auto req ID:
460972BR Job Category:
Cybersecurity Salary Range:
Not Disclosed
#J-18808-Ljbffr
Position:
Security Operations Center (SOC) Analyst Department:
Information Security Location:
On-site Oradell NJ Employment Type:
Full-time-40/Hr/Week Shifts: We operate 24 x 7 x 365 with shifts of 7AM-3PM ,9am-5PM, 10AM-6PM, 11AM-7 PM, 3-11PM, 4PM-12AM, 1AM-9AM Role Overview
The SOC Analyst is responsible for monitoring, detecting, analyzing, and responding to cybersecurity threats across the organization. This role combines technical expertise, analytical thinking, and strong communication skills to ensure the continuous protection of corporate information systems. The ideal candidate has experience with SIEM platforms, endpoint security tools, XDR solutions, and open-source security technologies. Key Responsibilities
Threat Monitoring & Detection:
Continuously monitor security events and alerts generated by SIEM platforms and XDR tools. Review and triage alerts from Splunk, openXDR, CrowdStrike Falcon, and other security tools. Identify indicators of compromise (IOCs) and abnormal activity across logs, endpoints, and networks.
Incident Response:
Investigate security incidents, assess severity, and initiate timely response actions. Perform root-cause analysis and document findings with actionable remediation guidance. Escalate high-impact incidents to senior analysts or incident response teams as required.
Log & Event Analysis:
Analyze logs from firewalls, servers, endpoints, cloud services, and security appliances. Tune SIEM and XDR rules to reduce false positives and improve detection capability. Maintain visibility across multi-platform environments using Splunk, CrowdStrike, and openXDR.
Security Operations & Maintenance:
Support the configuration and administration of SIEM and XDR systems. Contribute to detection engineering efforts, including creating new correlation rules and dashboards. Assist in maintaining threat intelligence feeds and updating detection indicators.
Reporting & Documentation:
Prepare incident reports, summaries, and metrics for leadership and compliance needs. Maintain runbooks, SOPs, and knowledge base material for SOC activities. Participate in compliance, auditing, and security policy enforcement efforts.
Required Skills & Qualifications
1–3 years of experience in a SOC environment or similar security-focused role. Hands‑on experience with SIEM platforms (e.g., Splunk, Elastic, QRadar, Azure Sentinel). Proficiency with:
Splunk (log collection, agent management, rule customization) openXDR platforms (threat detection, correlation, automated response) CrowdStrike Falcon (EDR monitoring, threat hunting, incident triage)
Strong understanding of networking, Linux/Windows OS internals, and security best practices. Knowledge of MITRE ATT&CK framework and common adversary techniques. Ability to analyze complex datasets and detect patterns indicative of malicious activity. Excellent communication and documentation skills. Preferred Qualifications
Security certifications such as Security+, CySA+, CEH, GCIA, or GCIH. Experience with scripting (Python, Bash, PowerShell) for automation. Familiarity with cloud security (AWS, Azure, GCP). Experience with threat hunting and detection engineering. Soft Skills
Strong analytical and problem‑solving abilities. Ability to work under pressure during active incidents. Additional Information
Minimum Education Required:
High School/GED Auto req ID:
460972BR Job Category:
Cybersecurity Salary Range:
Not Disclosed
#J-18808-Ljbffr