Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
- Monitor security alerts and detect potential threats and anomalies in a 24x7x365 Federal SOC environment
- Analyze system and network logs for security events, anomalies, and configuration issues
- Provide written analysis for each security alert and collaborate with Tier 2 SOC analysts for escalations
- Utilize SIEM and SOAR technologies to monitor, manage, and triage security events
- Respond to incidents, conduct threat intelligence analysis, and support incident response activities
- Use enterprise security tools, including NGAV/EDR, vulnerability scanners, and threat intelligence platforms
- Troubleshoot and resolve incidents/service requests using technical expertise
- Detect and understand various attack activities (e.g., reconnaissance, DDoS, malware)
- Manage alert notifications, triage, and initial incident review in SOC operations
- Prioritize events through effective triage and follow Standard Operating Procedures (SOPs)
- Process and triage security alerts from multiple sources (endpoint, SIEM, email, threat intel, etc.)
- Analyze vulnerability announcements, phishing emails, and support Tier 1 incident response
- Correlate events and conduct event timeline analysis across various log sources
- Analyze logs from operating systems (Linux/Windows), network security devices, and enterprise tools
- Demonstrate proficiency with enterprise SIEM/security analytics (Elastic Stack, Splunk)
- Analyze security events from tools such as Crowdstrike and Palo Alto
- Perform basic malware analysis and understand security incident response processes
- Apply knowledge of Federal Security Standards (NIST, DoD) and compliance requirements
- Hold or be working towards certifications such as Sec+CE, CEH, CySA+, GCIA, GCIH, etc.
- Have a Bachelor’s degree and a minimum of 3 years of related experience
Key Skills
Ranked by relevanceReady to apply?
Join Largeton Group and take your career to the next level!
Application takes less than 5 minutes