Today
Public Trust
Unspecified
Unspecified
Washington, TX (On-Site/Office)
Who we are:
ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a "work hard, play hard" mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.
The Perks:
As recognized members of the Cyber Elite, we work together in partnership to defend our nation's critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individual technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 80% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement, etc.
Who we're looking for:
We are seeking a Tier 1 SOC Analyst for a potential opportunity, with foundational experience in monitoring and analyzing cybersecurity events within federal environments. The ideal candidate will support real-time threat detection efforts and play a key role in identifying and escalating potential incidents. The Tier 1 SOC Analyst role focuses on continuous security monitoring, initial triage and incident tracking using automated tools and established response procedures. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market. Employment for this position is dependent on the successful award of the contract.
What you'll be doing:
What you need to know:
Must have's:
Beneficial to have:
Where it's done:
ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a "work hard, play hard" mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.
The Perks:
As recognized members of the Cyber Elite, we work together in partnership to defend our nation's critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individual technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 80% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement, etc.
Who we're looking for:
We are seeking a Tier 1 SOC Analyst for a potential opportunity, with foundational experience in monitoring and analyzing cybersecurity events within federal environments. The ideal candidate will support real-time threat detection efforts and play a key role in identifying and escalating potential incidents. The Tier 1 SOC Analyst role focuses on continuous security monitoring, initial triage and incident tracking using automated tools and established response procedures. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market. Employment for this position is dependent on the successful award of the contract.
What you'll be doing:
- Monitor and analyze security alerts and logs using SIEM tools (e.g., Splunk, QRadar, Elastic or equivalent).
- Perform initial triage and analysis of security events, correlating data across multiple sources.
- Identify indicators of compromise (IOCs), suspicious behavior and potential threats to federal systems.
- Escalate incidents to Tier 2 analysts and follow documented incident response procedures.
- Document all findings, incident details and analyst actions in the ticketing system with clarity and accuracy.
- Participate in daily SOC briefings and provide real-time situational awareness to leadership.
- Assist with tuning and filtering alerts to reduce false positives.
- Work collaboratively with security engineers, network teams and system administrators during investigations.
- Maintain awareness of the latest threats, vulnerabilities and threat actor techniques.
- Support compliance and reporting efforts aligned with NIST, FISMA and agency-specific security policies.
What you need to know:
- Experience using or familiarity with SIEM tools (e.g., Splunk, QRadar, ArcSight).
- Understanding of basic network protocols (TCP/IP, DNS, HTTP/S) and system logs (Windows, Linux).
- Ability to analyze security alerts, correlate events and identify potential incidents.
- Strong verbal and written communication skills.
- Willingness to work in a 24×7 operational environment, including shift work, weekends and holidays as needed.
- Strong problem-solving skills and ability to lead technical discussions.
Must have's:
- Bachelor's degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related field.
- 2+ years of relevant experience.
- Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
- Must be a U.S. citizen and eligible to obtain and maintain a security clearance, in compliance with federal contract requirements.
Beneficial to have:
- Prior experience supporting a federal government or defense program.
- Exposure to intrusion detection/prevention systems (IDS/IPS), endpoint detection tools or malware analysis platforms.
- Familiarity with NIST 800-53, FISMA or other federal cybersecurity frameworks.
- Understanding of MITRE ATT&CK framework and common attacker TTPs (Tactics, Techniques and Procedures).
- ITIL Foundation or experience working within IT service management (ITSM) environments.
Where it's done:
- Onsite (Washington, D.C. or Fort Worth, TX).
- This position may require participation in a rotating shift schedule or on-call support.
group id: 91085370