Security Operations Center Analyst, Mid
Washington
Thursday, 07 May 2026
As a security operations center (SOC) analyst, you’re in the middle of the action, responding to and mitigating threats in real time. You’re the first line of cyber defense for your organization, and they look to you for guidance on best practices and security measures. We need a Tier 2 SOC analyst like you to help us secure critical infrastructure from the constant onslaught of cyber attacks for a federal regulatory agency. As a SOC analyst on our team, you’ll monitor and analyze threats, using state-of-the-art tools like Splunk and Microsoft Sentinel. You’ll work with the team to understand, mitigate, and respond to threats quickly, restoring operations and limiting the impact. You’ll analyze incidents to figure out just how many systems are affected and assist recovery efforts. You’ll combine threat intelligence, event data, and assessments from recent events, and identify patterns to understand attackers’ goals to stop them from succeeding. This is a great opportunity to hone your cyber security skills with hands on experience in threat assessment and incident response. Join us. The world can’t wait. You Have:2 years of experience with SOC operations, incident response, or cyber threat intelligence. Experience monitoring SIEM and security tool dashboards, such as Splunk or Microsoft Sentinel, for alerts, anomalous activity, and potential security incidents. Knowledge of cyber threats, attack vectors, and incident response concepts. Knowledge of networking concepts, such as TCP/ IP, DNS, firewalls, and endpoints. Ability to perform initial triage and classification of security events. Ability to follow detailed procedures and escalation workflows. Ability to work in a fast-paced, SOC environment. Ability to obtain and maintain a Public Trust or Suitability/ Fitness determination based on client requirements. Bachelor’s degree. Nice If You Have:Experience assisting with basic incident response tasks, such as evidence collection, log review, and developing after-action reports and lessons learned. Experience maintaining awareness of current cybersecurity threats, trends, and vulnerabilities. Ability to support the continuous improvement of SOC procedures and runbooks. Possession of strong analytical, communication, and documentation skills. Industry recognized cybersecurity certifications. Vetting:Applicants selected will be subject to a government investigation and may need to meet eligibility requirements of the U.S. government client. Compensation.