user avatar
Posted today

Job Requirements

Tampa, FL
Top Secret Polygraph Unspecified
Career Level not specified
$50,000 - $55,000

Job Description

Description

As a SOC Tier 1 Analyst, you will play a critical role in safeguarding our clients' information systems and networks against cyber threats. You will be responsible for monitoring security events, analyzing alerts, and escalating incidents as necessary to ensure timely resolution. Additionally, you will collaborate closely with cross-functional teams to implement proactive security measures and contribute insights to enhance our overall security posture. This position requires shift work, including nights, weekends, and holidays, as the SOC provides 24/7/365 support to our customers.

ESSENTIAL DUTIES AND RESPONSIBILITIES

The essential functions include, but are not limited to the following:
  • Monitor security alerts and events generated by various security tools, including SIEM, IDS/IPS, firewalls, and endpoint protection systems.
  • Analyze and triage security incidents to determine their severity and potential impact on client environments.
  • Perform initial investigation and containment of security incidents, following established procedures and protocols.
  • Document incident details, including the timeline of events, actions taken, and any associated artifacts.
  • Escalate complex incidents to Tier 2 or Tier 3 analysts for further investigation and resolution.
  • Provide timely updates and communication to clients regarding the status of ongoing incidents.
  • Collaborate with other SOC team members to share knowledge and improve incident response processes.
  • Stay abreast of emerging threats and vulnerabilities to enhance the effectiveness of security monitoring and threat detection.
  • The ability to gain vendor specific certifications.


Requirements

  • Must be a US Citizen
  • 2+ years of experience in cybersecurity, Security Operations Center (SOC), or related information security roles.
  • Strong understanding of cybersecurity principles and common attack vectors
  • Excellent problem-solving skills and attention to detail
  • Effective communication skills, with the ability to convey technical information to both technical and non-technical stakeholders
  • Relevant baseline certifications such as CompTIA Security+, or ISC2 Certified in Cybersecurity certifications preferred
  • Preferred Qualifications (Knowledge, Skills, and Abilities)
  • Associate or bachelor's degree in cybersecurity, computer science, or related field
  • Hands-on experience with SIEM, IDS/IPS, and endpoint detection and response (EDR) tools (e.g., MS Defender, CrowdStrike, Sophos, SentinalOne)
  • Experience using ticketing systems (e.g., Microsoft Dynamics, ServiceNow, Jira) to track, document, and escalate security incidents and support requests efficiently
  • Hands-on experience using Splunk for security event monitoring, log analysis, and incident investigation within a SOC or cybersecurity environment.


Salary Description

$50,000 to $55,000
group id: 10432548
Find Northern Technologies Group, Inc. on Social Media
Network Employers
user avatar
About Us
NTG is where excellence meets innovation. As an SBA 8(a) and EDWOSB-certified leader in cybersecurity, IT consulting, and engineering, we leverage over 20 years of expertise to enhance the operations of our federal and commercial clients. Our ISO 9001:2015 certification reinforces our commitment to the highest standards of quality and excellence.

Northern Technologies Group, Inc. Jobs


Clearance Level
Top Secret