Security Operations Analyst (SOC Tier 2/3)

Washington, DC

⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️

ASSYST

Leading digital transformation specialists. Learn about AI program governance, cybersecurity solutions, and Assyst role in government's digital-first initiatives.

View all jobs at ASSYST

Apply now Apply later

Join our team to monitor, detect, and respond to security incidents across the enterprise. The analyst will help protect mission-critical GPO systems by triaging alerts, correlating threat data, and supporting incident response activities.

This position is contingent upon contract award. 

Location: Remote with periodic on-site meetings in Washington, DC
Clearance: Public Trust (or ability to obtain)


Responsibilities:
  • Monitor SIEM dashboards and alerts (Microsoft Sentinel, Defender)
  • Investigate incidents and recommend remediation actions
  • Support log analysis and correlation from cloud and on-prem sources
  • Produce documentation including incident reports, detection playbooks, SOPs

Qualifications:
  • 3+ years of SOC experience in federal or enterprise settings
  • Expertise with Microsoft Sentinel, Trellix, Stealthwatch, and NetWitness
  • Strong understanding of threat detection and response frameworks


ASSYST is an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, disability, military status, national origin or any other characteristic protected under federal, state, or applicable local law
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Clearance Cloud Incident response Log analysis Sentinel SIEM SOC Threat detection

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.