inform proactive threat hunting and incident analysis, maintaining awareness of evolving threat landscapes. • Documentation and Process Improvement: Ensure thorough documentation of incidents and contribute to the continuous improvement of SOC playbooks and response protocols. • Watchfloor Operations Leadership: Oversee shift-based SOCoperations, ensuring 24/7 coverage and adherence to established incident response procedures. • Cross-Functional Collaboration: Work … closely with SOC leadership, incident response teams, and threat intelligence analysts to strengthen the organization's overall security posture. Qualifications: Technical Expertise: - Extensive experience with cybersecurity tools, including SIEM (e.g., Splunk, Sentinel), EDR, IDS/IPS, firewalls, and threat intelligence platforms; - Deep understanding of network protocols, attack vectors, and defense methodologies; - Advanced analytical skills for threat detection, incident response … Incident Handler (GCIH), Certified Information Systems Security Manager (CISM), or Certified Ethical Hacker (CEH). Experience Level: - 1+ years of experience in cybersecurity with a focus on incident response, SOCoperations, or watchfloor management; - Demonstrated experience in shift-based or watchfloor roles and in leading response efforts for complex security incidents. Leadership Skills: - Strong leadership and mentoring abilities, with More ❯
Tyto Athene is searching for a SecurityOperations Center Analyst to support the customer Enterprise Cybersecurity Operations Support Team responsible for protecting the information and assets within the customer's information technology infrastructure, including sensitive data that directly supports the customer's mission, national security and operational readiness. The ideal candidate … will have SecurityOperations Center experience and familiarity with managing systems in compliance with regulatory frameworks such as FISMA/NIST, to include DoD cybersecurity mandates and guidance. The SOCAnalyst will be on the front lines of cyber defense-monitoring, detecting, investigating and responding to threats in real time, working in a fast-paced, collaborative environment … a CASP+ CE, CCNA Security, CCNP Security, CCSP, CISA, CISSP (or Associate), CND, CySA+, GCED, GCIH, GICSP, GSEC, Security+ CE, or SSCP certification. DoD 8140 Compliant for CSSP Analyst: Obtain a CCNA Cyber Ops, CCNA-Security, CEH, CFR, Cloud+, CySA+, GCIA, GCIH, GICSP, PenTest+, or SCYBER certification within 6 months of start date. Desired: Microsoft Security Operation AnalystMore ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria
that there is no boredom in our role. We have a growing Cyber practice in our Defence sector and support enterprise scale clients. Now we have opportunities for L2 SOC Analysts to join in our success and work with multiple, high profile clients. You must have proven experience working in a busy SOC with a tech-first approach … infrastructure. In-depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities. Provide Incident Response support. Maintain, improve and develop team knowledge of SOC tools, securityoperations and triage. Prepare reports for managed clients to both technical and non-technical audiences and continuously improve their content and presentation. Maintain and update security incident More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Description: Job Title: SOCAnalyst L2 Location: Melbourne, FL. Pay Rate$45/hr on w2 Job Description: Must Have- BS/BA (or equivalent) degree in IT Security or related field, and 2-4years related experience ; or 4+years related experience with 2 years post-Secondary/AA-AS degree; or 8+ years related experience with More ❯
and use of Cyber Stacks. Requires understanding of DHS/DoD policies and procedures, including NIST 800-53, CJCSM 6510.01B and other applicable policies. Preferred Qualifications: SecurityOperations Center (SOC) Experience. ESS (HBSS) Proficiency. ACAS Proficiency. CISCO Firewall data interpretation. SPLUNK & SYSLOG data normalization. The ability to work and set priorities on multiple projects/tasks at once and More ❯
Job Number: R SOC Malware Forensics Analyst, Senior The Opportunity: We are seeking an experienced Malware Forensics Analyst to join our SecurityOperations Center ( SOC ) team. This role requires analysis and collection of digital evidence to support investigations on the latest actionable threat intelligence that includes adversary indicators of compromise ( IOCs ) , technique, tactics, and … an Agency environment Secret clearance Bachelor's degree Cybersecurity Certification such as CISSP, GCTI, G CIA , GCIH, CEH, or CTIA Certification Nice If You Have: Experience working in a SOC or cyber operations environment Knowledge of threat modeling and adversary tactics, techniques, and frameworks such as the Diam ond Model, MITRE ATT & CK, or Cyber Kill Chain Ability to More ❯
infrastructures, working alongside leaders in aviation, engineering, data science, and systems integration. At Peraton, you won't just support the mission - you'll define it. The SecurityOperations Center (SOC) Analyst provides oversight and operational leadership for security monitoring, event triage, and incident response activities, ensuring continuous protection, resilience, and readiness of FAA systems and networks. This … documents, decision papers, staffing packages, memorandums, and official correspondence for senior leadership and interagency stakeholders. Contribute to organizational improvement by developing new approaches for coordination, integration, and execution of SOC and cybersecurity operations. Qualifications Required Qualifications Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or a related field. 15+ years of relevant experience with a BS/BA. … cyber threats, and vulnerabilities. Strong knowledge of national regulations, policies, ethics, and standards as they relate to cybersecurity and cyber operations. Demonstrated experience with incident response, event triage, and SOCoperations in a complex, high-stakes environment. U.S. Citizenship and ability to obtain and maintain a security clearance (Public Trust or higher, up to TS/SCI depending on More ❯
Blu Omega, a Woman Owned Small Business, is looking for SOC Analysts to join our team! In this role, you will be operating in a rotating, 24x7 environment in Herndon, VA. Responsibilities: Investigate suspicious or malicious activity, or other cyber events which could violate policy. Monitor and analyze security events and alerts on a 24x7x365 basis Qualifications: Experience analyzing … IDS). Experience with various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise environments. 1-3 years of experience working in a SecurityOperations Center (SOC) or Network Operations Center (NOC) performing security event monitoring and analysis. Experience using EDR and SIEM technologies. Incident response (IR) framework experience. Working knowledge of network communications and routing More ❯
CYBER SECURITYANALYST | SECURITYOPERATIONS CENTER (SOC). Summer-Browning Associates is supporting our client in the Central Government who is seeking a Cyber SecurityAnalyst for an initial 12-month assignment, with the possibility of extension. Location: London | Hybrid| Remote The ideal candidates will hold active DV clearance and have a proven background in … Cyber Security, with the following skills and experience: Experience in SOCoperations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Ability to perform triage of security events to determine their scope, priority More ❯
Job Number: R SOC Malware Analyst Key Role: Be responsible for performing advanced malware analysis and static reverse engineering of malicious code and files along with documentation of analysis for incident reports as needed during a security investigation. Manage dangerous malware in controlled environments. Support analysis and research on latest malware to provide actionable threat intelligence, including … other forms of advanced malware in the agency environment Secret clearance Bachelor's degree CISSP, GCTI, G CIA , GCIH, CEH, or CTIA Certification Additional Qualifications: Experience working in a SOC or cyber operations environment Knowledge of threat modeling and adversary tactics and techniques frameworks such as MITRE ATT & CK matrices, Cyber Kill Chain, STRIDE, and PASTA Ability to write More ❯
TMC Technologies is in search of a senior level Cybersecurity Analyst to the FBI's ESOC Watch Floor Operations Team, playing a crucial role in the FBI's cybersecurity defense strategy. Operating around the clock, 24/7, 365 days a year, this dynamic team ensures the timely detection and resolution of potential security incidents, thereby minimizing the … SCI) eligibility to start due to federal contract requirements. This position is in support of a newly awarded contract and does require shift work The Watch Floor Cybersecurity Analyst - Senior will have the following responsibilities: - Responsible for monitoring computer networks for security issues. - Investigating security breaches and other cybersecurity incidents. - Document security breaches and assess the damage they … with security information and event management (SIEM) systems preferred - Splunk experience required - Preferred certifications include: GIAC Continuous Monitoring Certification (GMON) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) Microsoft Sentinel We are equal opportunity/affirmative action employers, committed to diversity in More ❯
Tyto Athene is searching for a Senior SecurityOperations Center Analyst to support the customer Enterprise Cybersecurity Operations Support Team responsible for protecting the information and assets within the customer's information technology infrastructure, including sensitive data that directly supports the customer's mission, national security and operational readiness. The ideal candidate will have SecurityOperations Center experience … concepts and methods. Bachelor's degree in Computer Science or related field DoD 8140 Compliant for IAT Level III: CISSP, or equivalent certifications. DoD 8140 Compliant for CSSP Analyst: Obtain a CCNA Cyber Ops, CCNA-Security, CEH, CFR, Cloud+, CySA+, GCIA, GCIH, GICSP, PenTest+, or SCYBER certification within 6 months of start date. Desired: Microsoft Security Operation AnalystMore ❯
TMC Technologies is in search of a mid-level Cybersecurity Analyst to join the FBI's ESOC Watch Floor Operations Team, playing a crucial role in the FBI's cybersecurity defense strategy. Operating around the clock, 24/7, 365 days a year, this dynamic team ensures the timely detection and resolution of potential security incidents, thereby minimizing … Information (SCI) eligibility to start due to federal contract requirements. This position is in support of a newly awarded contract and requires shift work. The Watch Floor Cybersecurity Analyst - Mid will have the following responsibilities: - Responsible for monitoring computer networks for security issues. - Investigating security breaches and other cybersecurity incidents. - Document security breaches and assess the damage they … with security information and event management (SIEM) systems preferred - Splunk experience required - Preferred certifications include: GIAC Continuous Monitoring Certification (GMON) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) Microsoft Sentinel We are equal opportunity/affirmative action employers, committed to diversity in More ❯
Kforce has a client in Huntsville, AL seeking a SOC Watchfloor Analyst. Duties Include: Responsible for monitoring computer networks for security issues Investigating security breaches and other cybersecurity incidents Document security breaches and assess the damage they cause Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing Fix detected vulnerabilities to maintain More ❯
Required Skills: (Junior level) applicable 1 to 2 years of experience in securityoperations, demonstrating analytical duties and preforming host or network security analysis. • Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, system/application More ❯