S

Security Operations Center (SOC) Analyst

SkyePoint Decisions

Posted today
Secret
Early Career (2+ yrs experience)
$70,000 - $80,000
No Traveling
IT - Security
Orlando, FL (On-Site/Office)

SkyePoint Decisions is a leading Cybersecurity Architecture and Engineering, Critical Infrastructure and Operations, and Applications Development and Maintenance IT service provider headquartered in Dulles, Virginia with operations across the U.S. We provide innovative enterprise-wide solutions as well as targeted services addressing the complex challenges faced by our federal government clients. Our focus is on enabling our clients to deliver their mission most efficiently and effectively – anytime, anywhere, securely. We combine technical expertise, mission awareness, and an empowered workforce to produce meaningful results.

This is a contingent position based upon customer approval.

SkyePoint Decisions is seeking a Security Operation Center (SOC) Analyst II to support a government contract in the Orlando, FL area. This position will be on site 5 days a week.

As the Security Operations Center (SOC) operates around the clock, this role requires participation in a rotating shift schedule. Shifts may vary in length, typically ranging from 8 to 14 hours, and will cover all hours of the day to ensure continuous operational coverage.

Responsibilities:

Performs the daily operation activities of the SOC, ensuring effective detection, analysis, and response to security incidents across both unclassified and classified networks.
Implements strategic plans for the SOC to improve security posture, incident response capabilities, and threat intelligence.
Complies with relevant laws, regulations, and policies governing unclassified and classified information security.
Participates in the response to security incidents, coordinating with both unclassified and classified network teams to mitigate threats and recover from security breaches.
Collects, analyzes, and disseminates threat intelligence across both network domains, facilitating proactive defense measures.
Conducts continuous monitoring of the security posture of both network types, analyzing security events and alerts to identify potential threats.
Implements and manages security tools and technologies used for monitoring, analysis, and defense of the SOC's networks.
Prepares cybersecurity and RMF documentation.

Required Qualifications:

Bachelor’s degree with 2+ years of relevant experience, OR Master’s degree with 1+ year of relevant experience, OR Associate’s degree with 4+ years of relevant experience. 6 years of directly related experience may be considered in lieu of degree.
Must have an active Secret clearance.
Possesses the following certification:
Security+ CE
Hands-on experience supporting Incident Response activities
Practical experience applying STIG (Security Technical Implementation Guide) compliance
Working experience with Endpoint Detection and Response (EDR) tools
Applied knowledge of the NIST Risk Management Framework (RMF)
Must be able to work on site 5 days a week.
Must be able to support shift work.
U.S. citizenship required.

Preferred Qualifications:

Experience with Windows and Linux (RHEL).
Possess one the following certifications:
CySA+, CCNA Security, GICSP, GSEC, SSCP
group id: 10370519
N
Name HiddenRecruiter

Match Score

Powered by IntelliSearch™
image match score
Create an account or Login to see how closely you match to this job!

Similar Jobs


Job Category
IT - Security
Clearance Level
Secret