Enable job alerts via email!

Cybersecurity Analyst (Mid) - FBI

NexThreat

Washington (District of Columbia)

On-site

USD 70,000 - 95,000

Full time

2 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading company in the cybersecurity field is seeking a mid-level Cybersecurity Analyst to join their Security Operations Center in Washington, DC. The role involves monitoring security events, analyzing incidents, and collaborating with a dedicated team to enhance cybersecurity measures. Candidates should possess a relevant degree and experience in security analysis along with proficiency in tools like Splunk. This position offers the opportunity to work in a fast-paced environment with significant responsibility.

Qualifications

  • 3-5 years relevant experience in cybersecurity analysis or within a SOC.
  • Proficiency in monitoring and analyzing security events.

Responsibilities

  • Monitor security events and alerts using industry-standard tools.
  • Analyze security incidents and document findings.
  • Collaborate with the Watch Floor Team for incident detection.

Skills

Analytical skills
Problem-solving skills

Education

Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field

Tools

Splunk
Microsoft Sentinel

Job description

2 days ago Be among the first 25 applicants

Get AI-powered advice on this job and more exclusive features.

Job Title:Cybersecurity Analyst (Mid)

Location: NCR or Clarksburg

Job Category: Information Technology

Time Type: Full-time

Clearance Requirement: Current TS/SCI Clearance required

Security Suitability: Must pass FBI security suitability

Polygraph Requirement: Must pass an FBI administered Counterintelligence polygraph if one has not been conducted within the last five years.

Employee Type: W2 or 1099

Citizenship: US Citizen, no Dual Citizenship

Summary:

NexThreat is seeking Cybersecurity Analyst (Mid). The Mid-Level Cybersecurity Analyst is an integral part of the Watch Floor Team within the Security Operations Center (SOC). This team operates around the clock, 24/7, 365 days a year, ensuring the timely detection and resolution of potential security incidents. By minimizing the impact of cyber threats, the team plays a crucial role in safeguarding the confidentiality, integrity, and availability of the organization’s information assets. The Mid-Level Analyst is responsible for actively detecting, monitoring, preventing, and analyzing real-time cybersecurity information, events, and threats.

Key Responsibilities:

  • Monitor security events and alerts using industry-standard tools to identify potential threats and vulnerabilities
  • Analyze and investigate security incidents, documenting findings and recommending remediation steps
  • Collaborate with the Watch Floor Team to ensure efficient incident detection and response
  • Assist in developing and refining incident response procedures and playbooks
  • Generate reports on security incidents, trends, and recommendations for management review
  • Participate in ongoing training and professional development to enhance cybersecurity skills and knowledge
  • Contribute to the enhancement of SOC processes, tools, and technologies to improve overall efficiency


Unique Skills/Tasks/Software:

  • Required:
  • Proficiency in using Splunk Enterprise Security for monitoring and analysis of security events
  • Preferred:
  • Familiarity with Microsoft Sentinel for cloud-based security operations


Certifications (Preferred):

  • GIAC Continuous Monitoring Certification (GMON)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Network Forensic Analyst (GNFA)
  • GIAC Cloud Threat Detection (GCTD)
  • GIAC Cloud Forensics Responder (GCFR)


Qualifications:

  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field
  • Relevant experience (typically 3-5 years) in cybersecurity analysis or a similar role within a SOC environment
  • Strong analytical and problem-solving skills, with the ability to prioritize tasks in a fast-paced environment

Seniority level
  • Seniority level
    Not Applicable
Employment type
  • Employment type
    Full-time
Job function
  • Job function
    Information Technology
  • Industries
    Computer and Network Security

Referrals increase your chances of interviewing at NexThreat by 2x

Sign in to set job alerts for “Cyber Security Analyst” roles.
Security Operations Center (SOC) Analyst

Washington DC-Baltimore Area $70,000.00-$95,000.00 1 day ago

Security Operations Center (SOC) Analyst - Mid

Washington, DC $120.00-$125.00 13 hours ago

Washington DC-Baltimore Area $69.00-$73.00 7 hours ago

Senior Security Operations Center (SOC) Analyst
FBI Special Agent: Cybersecurity/IT Expertise

Arlington, VA $99,461.00-$128,329.00 6 days ago

Senior Security Operations Center (SOC) Analyst - TS
Junior Cybersecurity SIEM Monitoring Analyst

Washington, DC $80,000.00-$85,000.00 1 hour ago

Chantilly, VA $120,000.00-$160,000.00 1 week ago

Information Security Analyst (SOC 2 Compliance)

Fairfax, VA $92,400.00-$115,000.00 1 month ago

2026674 Cyber Security Analyst $175,000.00

Washington, DC $55,000.00-$85,000.00 1 hour ago

Washington, DC $92,000.00-$130,000.00 2 days ago

Junior Cybersecurity Threat Intelligence Analyst

District of Columbia, United States 1 hour ago

Washington, DC $85,000.00-$110,000.00 1 week ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.