Enable job alerts via email!

Security Operations Center Analyst

COLSA Corporation

California

On-site

USD 80,000 - 120,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking a Local Defender to safeguard digital assets and combat cyber threats. This critical role merges the responsibilities of a Security Operations Center Analyst and Threat Analyst, emphasizing proactive monitoring and incident response. The ideal candidate will possess a robust background in cybersecurity, with a focus on threat analysis and incident management, while collaborating with cross-functional teams. This position offers a dynamic environment where your expertise will directly contribute to enhancing the organization's security posture and ensuring compliance with government directives. If you are passionate about cybersecurity and ready to take on new challenges, this role is perfect for you.

Benefits

Medical Insurance
Dental Insurance
Vision Insurance
Life Insurance
401(k) with company match
Paid Time Off
Employee Assistance Program
Education & Certification Reimbursement

Qualifications

  • 7-10 years of IT/OT experience, including 3-5 years in a senior role.
  • Active DoD Secret Security Clearance required.

Responsibilities

  • Monitor and analyze security events and alerts to identify potential threats.
  • Generate detailed reports for leadership summarizing identified threats and incidents.

Skills

Cybersecurity
Threat Analysis
Incident Response
Analytical Skills
Problem-Solving
Communication Skills

Education

Bachelor's degree in Cybersecurity, Computer Science, or related field
Equivalent experience

Tools

SIEM platforms
Firewalls
IDS/IPS
Endpoint Detection Tools
Threat Detection Platforms

Job description

The Local Defender is a critical cybersecurity role responsible for protecting the organization's digital assets through proactive monitoring, analysis, and response to cyber threats. This role combines the duties of a Security Operations Center (SOC) Analyst and Threat Analyst to ensure a holistic defense against emerging threats. Key responsibilities include monitoring security logs, analyzing and reporting cyber incidents, reviewing Common Vulnerabilities and Exposures (CVEs), and implementing directives from NETCOM (e.g., Cyber Tasking Orders – CTO). Work is performed on-site with occasional on-call duties for critical incidents in a collaborative, demanding environment requiring attention to emerging threats and vulnerabilities.

The preferred candidate will be well-versed in common cyber threats, vulnerabilities, and adversarial tactics, techniques, and procedures (TTPs). In this role, the candidate is expected to work with minimal guidance, in a cross-functional team, ensuring reports and recommendations are effectively communicated and actioned to support the Government customer and mission requirements.

Principal Duties and Responsibilities
SOC Activities and Duties
  • Monitor and analyze security events and alerts generated by SIEM platforms, firewalls, IDS/IPS, and endpoint detection tools to identify potential threats and anomalous behavior.
  • Analyze potential security incidents and investigate to determine the scope, impact, and root cause, and recommend effective remediation strategies.
  • Perform triage on security incidents to identify root causes and recommend appropriate mitigation measures.
  • Conduct regular reviews of SIEM reports to identify patterns, trends, and potential vulnerabilities within the organization's infrastructure.
  • Develop actionable recommendations based on SIEM data analysis to enhance detection capabilities, optimize alert configurations, and address identified gaps.
  • Escalate critical incidents to senior leadership or appropriate teams and provide detailed incident summaries with proposed mitigation actions.
  • Maintain accurate documentation of security events and incident-handling procedures.
  • Monitor and evaluate Cyber Tasking Orders (CTOs) and other directives from NETCOM, ensuring compliance and timely implementation of mitigations.
  • Conduct research on the latest organization’s environment threat vectors, attack methodologies, and adversarial tactics, techniques, and procedures (TTPs).
  • Collaborate with other cybersecurity team members and the government customer to integrate threat intelligence into incident detection and response processes.
  • Analyze CVEs, security bulletins, threat intelligence feeds, and security advisories to assess their relevance and potential impact to the mission and the organization’s environment.
  • Correlate threat intelligence with SIEM findings to identify and assess emerging threats.
  • Develop and communicate proactive mitigation strategies based on threat landscape trends and adversary tactics.
Reporting & Communication
  • Generate detailed and actionable reports for leadership from SIEM platforms summarizing identified threats, incidents, and remediation steps.
  • Provide recommendations for improving the organization’s cybersecurity posture based on incident trends and threat intelligence.
  • Maintain clear communication with cross-functional teams to ensure alignment with security objectives and protocols.
  • Generate detailed reports on threats, false positives, and actionable insights.
  • Provide the Government customer and leadership with concise, data-driven recommendations for enhancing the organization’s cybersecurity defenses based on SIEM trends and incident analysis.
  • Prepare summaries and status updates of security posture improvements resulting from SIEM data analysis and implemented recommendations.
Security Tool Management & Optimization
  • Support the configuration, tuning, and optimization of security monitoring tools, including SIEM and threat detection platforms.
  • Conduct periodic reviews and updates of security tools to address gaps or inefficiencies.
  • Participate in the testing and implementation of new security technologies as required.
  • Collaborate with the team and the stakeholder community to fine-tune SIEM configurations, including custom rule creation and log source integration, to improve threat detection accuracy.
  • Conduct periodic evaluations of SIEM and related tools, providing recommendations for feature enhancements or additional capabilities.
  • Support the testing and deployment of security solutions to ensure seamless integration with the existing monitoring infrastructure.
Required Experience
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field (or equivalent experience). Minimum of 3 related certifications may be used in place of related academic field.
  • Minimum of 7-10 years in IT/OT roles, including at least 3-5 years of experience in a senior role. 2+ years of experience in a SOC, cybersecurity, or related role.
  • Active DoD Secret Security Clearance required.
  • Proficiency in analyzing security events, logs, and alerts from various security tools (e.g., SIEM, firewalls, IDS/IPS).
  • Familiarity with CVEs, threat intelligence frameworks (e.g., MITRE ATT&CK), and vulnerability management practices.
  • Knowledge of NETCOM policies, Cyber Tasking Orders (CTOs), and cybersecurity compliance requirements.
  • Strong analytical and problem-solving skills with attention to detail.
  • May require CONUS and/or OCONUS travel to customer sites.
Preferred Qualifications:
  • Offensive Security Certified Professional (OSCP).
  • Experience with scripting languages (e.g., Python, PowerShell) for automating security tasks.
  • Understanding of advanced threat detection methodologies and incident response processes.
  • Excellent verbal and written communication skills for creating technical reports and presentations.
Certifications:
  • CISSP, CompTIA Security+, CySA+, CEH, or GIAC certifications (e.g., GCIH, GCIA), Splunk Core Certified User / Power User, Cisco Certified CyberOps Associate.

Applicant selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information. COLSA Corporation is an Equal Opportunity Employer, Minorities/Females/Veterans/Disabled. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, or national origin.

This position will be posted for a minimum of 3 business days. If a candidate has not been selected at that time, it will continue to be posted until a suitable candidate is selected or the position is closed.

COLSA offers a comprehensive and customizable benefits program which includes Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, Accidental Death & Dismemberment, Supplemental Income Protection Programs, 401(k) with company match, Flexible Spending Accounts, Employee Assistance Program, Education & Certification Reimbursement, Employee Discount Program, Wellness Program, Paid Time Off and Holidays.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Security Operations Center Analyst

Cloudflare, Inc.

San Francisco

Remote

USD 70,000 - 110,000

7 days ago
Be an early applicant

Security Operations Center Analyst

360 SOC, Inc.

Remote

USD 60,000 - 100,000

3 days ago
Be an early applicant

Security Operations Center Analyst

Vernovis

Cincinnati

On-site

USD 60,000 - 100,000

Yesterday
Be an early applicant

Clinical Informatics Analyst - CI OPS Post Acute

Sanford Health

Remote

USD 80,000 - 100,000

Yesterday
Be an early applicant

Clinical Informatics Analyst - CI OPS Post Acute

Good Samaritan Society

Iowa

Remote

USD 80,000 - 100,000

Yesterday
Be an early applicant

Security Operations Center Analyst

Cloudflare

Remote

USD 60,000 - 100,000

30+ days ago

Security Operations Center Analyst

TekStream Solutions

Atlanta

Remote

USD 80,000 - 100,000

30+ days ago

Clinical Informatics Analyst - CI OPS Post Acute

Good Samaritan Society

Minnesota

Remote

USD 80,000 - 100,000

3 days ago
Be an early applicant

Clinical Informatics Analyst - CI OPS Post Acute

Good Samaritan Society

North Dakota

Remote

USD 80,000 - 100,000

3 days ago
Be an early applicant