Today
Top Secret/SCI
Early Career (2+ yrs experience)
$80,000 - $90,000
No Traveling
IT - Security
Huntsville, AL (On-Site/Office)
"We are seeking Junior-Level Incident Response Analysts and Watchfloor Analysts to support our cybersecurity operations. This role involves monitoring, analyzing, and responding to security incidents in real-time, ensuring the protection of critical systems.
Key Responsibilites:
• Advanced Threat Monitoring and Analysis: Lead threat monitoring activities to detect and analyze complex security incidents using SIEM tools, IDS/IPS, EDR, and other advanced security platforms.
• Incident Response and Coordination: Direct and manage incident response actions, from identification through containment, eradication, and recovery.
• Threat Intelligence Application: Leverage threat intelligence sources to inform proactive threat hunting and incident analysis, maintaining awareness of evolving threat landscapes.
• Documentation and Process Improvement: Ensure thorough documentation of incidents and contribute to the continuous improvement of SOC playbooks and response protocols.
• Watchfloor Operations Leadership: Oversee shift-based SOC operations, ensuring 24/7 coverage and adherence to established incident response procedures.
• Cross-Functional Collaboration: Work closely with SOC leadership, incident response teams, and threat intelligence analysts to strengthen the organization’s overall security posture.
Qualifications:
Technical Expertise: - Extensive experience with cybersecurity tools, including SIEM (e.g., Splunk, Sentinel), EDR, IDS/IPS, firewalls, and threat intelligence platforms; - Deep understanding of network protocols, attack vectors, and defense methodologies; - Advanced analytical skills for threat detection, incident response, and forensic investigation.
Certifications: - Highly preferred certifications include Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Manager (CISM), or Certified Ethical Hacker (CEH).
Experience Level: - 1+ years of experience in cybersecurity with a focus on incident response, SOC operations, or watchfloor management; - Demonstrated experience in shift-based or watchfloor roles and in leading response efforts for complex security incidents.
Leadership Skills: - Strong leadership and mentoring abilities, with experience in training and developing junior analysts; - Excellent communication skills and a collaborative mindset, able to effectively engage with both technical and non-technical teams.
Work Schedule: This position requires shift-based work as part of a 24/7 SOC team rotation, including nights, weekends, and holidays.
"
Key Responsibilites:
• Advanced Threat Monitoring and Analysis: Lead threat monitoring activities to detect and analyze complex security incidents using SIEM tools, IDS/IPS, EDR, and other advanced security platforms.
• Incident Response and Coordination: Direct and manage incident response actions, from identification through containment, eradication, and recovery.
• Threat Intelligence Application: Leverage threat intelligence sources to inform proactive threat hunting and incident analysis, maintaining awareness of evolving threat landscapes.
• Documentation and Process Improvement: Ensure thorough documentation of incidents and contribute to the continuous improvement of SOC playbooks and response protocols.
• Watchfloor Operations Leadership: Oversee shift-based SOC operations, ensuring 24/7 coverage and adherence to established incident response procedures.
• Cross-Functional Collaboration: Work closely with SOC leadership, incident response teams, and threat intelligence analysts to strengthen the organization’s overall security posture.
Qualifications:
Technical Expertise: - Extensive experience with cybersecurity tools, including SIEM (e.g., Splunk, Sentinel), EDR, IDS/IPS, firewalls, and threat intelligence platforms; - Deep understanding of network protocols, attack vectors, and defense methodologies; - Advanced analytical skills for threat detection, incident response, and forensic investigation.
Certifications: - Highly preferred certifications include Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Manager (CISM), or Certified Ethical Hacker (CEH).
Experience Level: - 1+ years of experience in cybersecurity with a focus on incident response, SOC operations, or watchfloor management; - Demonstrated experience in shift-based or watchfloor roles and in leading response efforts for complex security incidents.
Leadership Skills: - Strong leadership and mentoring abilities, with experience in training and developing junior analysts; - Excellent communication skills and a collaborative mindset, able to effectively engage with both technical and non-technical teams.
Work Schedule: This position requires shift-based work as part of a 24/7 SOC team rotation, including nights, weekends, and holidays.
"
group id: 10105424
Accelerating IT transformation in the public sector