Enable job alerts via email!

Tier 2 SOC Analyst

ShorePoint

Washington (District of Columbia)

On-site

USD 85,000 - 120,000

Full time

6 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

ShorePoint seeks a Tier 2 SOC Analyst skilled in incident investigation and threat detection. The role involves analyzing escalated security events, performing threat hunting, and improving cybersecurity measures as part of a dedicated team. A comprehensive benefits package and a supportive work environment await candidates with a relevant degree and Security+ certification.

Benefits

18 days of PTO
11 holidays
80% of insurance premium covered
401k
Continued education reimbursement

Qualifications

  • 3+ years of relevant experience in cybersecurity.
  • Security+ certification or equivalent.
  • Proven ability to analyze complex requirements.

Responsibilities

  • Analyze escalated security events from Tier 1 analysts.
  • Perform threat hunting and log correlation using SIEM platforms.
  • Assist with incident response activities.

Skills

Analytical skills
Incident investigation
Threat detection
Communication

Education

Bachelor’s degree in Cybersecurity or related field

Tools

SIEM tools (e.g., Splunk, QRadar)
EDR platforms (e.g., CrowdStrike)
Packet analysis tools (e.g., Wireshark)

Job description

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individual technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 80% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement, etc.

Who we’re looking for:

We are seeking a Tier 2 SOC Analyst for a potential opportunity, with strong analytical skills and hands-on experience in incident investigation and threat detection. The ideal candidate will support cybersecurity response efforts by analyzing escalated events and applying threat intelligence to improve situational awareness. The Tier 2 SOC Analyst role is responsible for performing log correlation, threat hunting and forensic analysis in support of an evolving federal cybersecurity mission. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market. Employment for this position is dependent on the successful award of the contract.

What you’ll be doing:

  • Analyze and investigate escalated security events from Tier 1 analysts, including anomalous user behavior, malware infections and network intrusions.
  • Perform threat hunting and log correlation using SIEM platforms (e.g., Splunk, QRadar, ELK, ArcSight).
  • Assist with incident response activities, including containment, eradication and recovery under the direction of senior analysts or incident handlers.
  • Conduct root cause analysis on confirmed incidents and recommend preventive actions.
  • Develop and update SOC playbooks, detection rules and procedures for common security events.
  • Monitor threat intelligence feeds and apply relevant indicators to ongoing investigations.
  • Participate in vulnerability and threat assessments and recommend improvements to detection capabilities.
  • Work with engineering teams to tune detection rules, integrate new log sources and improve SOC visibility.
  • Document analysis steps, timelines and technical findings in support of incident response and reporting.
  • Maintain compliance with government cybersecurity policies and assist with audit preparation.

What you need to know:

  • Hands-on experience with one or more SIEM tools (e.g., Splunk, QRadar, ArcSight).
  • Solid understanding of network protocols (TCP/IP, DNS, HTTP/S) and operating system logs (Windows/Linux).
  • Experience with intrusion detection systems (IDS/IPS), endpoint detection and response (EDR) or packet capture tools.
  • Familiarity with incident handling and investigation procedures.
  • Knowledge of threat actor tactics, techniques and procedures (TTPs) and frameworks like MITRE ATT&CK.
  • Strong communication and technical writing skills for reporting and documentation.

Must have’s:

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related field.
  • 3+ years of relevant experience.
  • Security+ certification (CompTIA) or equivalent (e.g., SSCP, GSEC, CySA+).
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Must be a U.S. citizen and eligible to obtain and maintain a security clearance, in compliance with federal contract requirements.

Beneficial to have:

  • Experience supporting federal cybersecurity programs or working in a compliance-driven environment.
  • Familiarity with FISMA, NIST 800-53, DISA STIGs and other government cybersecurity standards.
  • Experience with malware analysis, scripting (Python, PowerShell) or packet analysis tools (e.g., Wireshark).
  • Hands-on experience with EDR platforms (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint).
  • Incident response training or certifications (e.g., GCIA, GCIH, ECIH or similar).

Where it’s done:

  • Onsite (Washington, D.C. or Fort Worth, TX).
  • This position may require participation in a rotating shift schedule or on-call support.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Tier 2 SOC Analyst

Tyto Athene, LLC

Washington

On-site

USD 90,000 - 110,000

6 days ago
Be an early applicant

SOC Analyst-Tier 2 (R-00069)

True Zero Technologies

Washington

On-site

USD 90,000 - 120,000

6 days ago
Be an early applicant

SOC Analyst (Tier 2)

MindPoint Group, A Tyto Athene Company

Washington

On-site

USD 90,000 - 110,000

7 days ago
Be an early applicant

SOC Analyst (Tier 2)

MindPoint Group

Washington

On-site

USD 90,000 - 110,000

8 days ago

SOC Analyst (Tier 2)

MindPoint Group

Washington

On-site

USD 90,000 - 110,000

9 days ago

Tier 3 SOC Analyst

ShorePoint

Washington

On-site

USD 100,000 - 140,000

6 days ago
Be an early applicant

Lead SOC Security Analyst - US Citizenship - 100% ONSITE

VISUAL SOFT, INC

Washington

Hybrid

USD 80,000 - 120,000

5 days ago
Be an early applicant

Security Operations Center (SOC) Analyst 3

Maveris

Washington

On-site

USD 100,000 - 130,000

Yesterday
Be an early applicant

Lead SOC Security Analyst - US Citizenship - 100% ONSITE

VISUAL SOFT, INC

Washington

On-site

USD 90,000 - 120,000

30+ days ago