Job Requirements
Raleigh, NC
Secret Polygraph Unspecified
Career Level not specified
$115,000 - $135,000
Job Description
Piper Companies is seeking a SOC Analyst to join a growing cybersecurity organization supporting sensitive environments. This SOC Analyst role is ideal for a security professional with heavy Splunk experience, an active Secret clearance, and a passion for threat detection and incident response in a fast-paced SOC environment. The SOC Analyst will work closely with security engineers and incident responders to monitor, analyze, and respond to security events.
Responsibilities of the SOC Analyst:
• Monitor, triage, and investigate security alerts using Splunk and other SIEM tools.
• Analyze logs, network traffic, and endpoint data to identify potential threats and vulnerabilities.
• Respond to security incidents, including containment, eradication, and recovery activities.
• Create, tune, and maintain Splunk dashboards, alerts, and correlation searches.
• Document incidents, findings, and response actions in accordance with security policies and procedures.
• Collaborate with security engineers and stakeholders to improve SOC processes and detection capabilities.
• Support continuous improvement of security monitoring and incident response workflows.
Qualifications of the SOC Analyst:
• Active Secret security clearance (required)
• 3+ years of experience in a Security Operations Center (SOC) or similar security role.
• Heavy hands-on experience with Splunk, including alerting, dashboards, and log analysis.
• Strong understanding of security events, incident response, and threat detection techniques.
• Experience analyzing network, system, and application logs.
Compensation for the SOC Analyst includes:
• Salary range: $115,000 - $135,000 depending on experience
• Comprehensive benefits package including medical, dental, vision, 401(k), and PTO
This job opens for applications on 05/19/2026. Applications for this job will be accepted for at least 30 days from the posting date.
#LI-JN1
#LI-ONSITE
Responsibilities of the SOC Analyst:
• Monitor, triage, and investigate security alerts using Splunk and other SIEM tools.
• Analyze logs, network traffic, and endpoint data to identify potential threats and vulnerabilities.
• Respond to security incidents, including containment, eradication, and recovery activities.
• Create, tune, and maintain Splunk dashboards, alerts, and correlation searches.
• Document incidents, findings, and response actions in accordance with security policies and procedures.
• Collaborate with security engineers and stakeholders to improve SOC processes and detection capabilities.
• Support continuous improvement of security monitoring and incident response workflows.
Qualifications of the SOC Analyst:
• Active Secret security clearance (required)
• 3+ years of experience in a Security Operations Center (SOC) or similar security role.
• Heavy hands-on experience with Splunk, including alerting, dashboards, and log analysis.
• Strong understanding of security events, incident response, and threat detection techniques.
• Experience analyzing network, system, and application logs.
Compensation for the SOC Analyst includes:
• Salary range: $115,000 - $135,000 depending on experience
• Comprehensive benefits package including medical, dental, vision, 401(k), and PTO
This job opens for applications on 05/19/2026. Applications for this job will be accepted for at least 30 days from the posting date.
#LI-JN1
#LI-ONSITE
group id: 10430981