Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
We are seeking an Information Security Analyst to strengthen our security operations and threat monitoring efforts. In this role, you will leverage Splunk, SQL, and programming expertise to identify, investigate, and respond to cybersecurity incidents within a dynamic and complex environment.
The ideal candidate will have hands on SOC experience, strong analytical skills, and a proactive mindset for identifying and mitigating threats. This role offers the opportunity to contribute to high-impact cybersecurity operations that protect critical national and organizational missions.
Responsibilities:
- Monitor and analyze security events using Splunk and other SIEM/Security Information and Event Management tools.
- Apply SPL/Search Processing Language for advanced data queries, dashboards, and alerting.
- Support incident response activities following the cyber kill chain methodology.
- Write and maintain scripts or tools using Python or R to automate analysis and improve detection efficiency.
- Use SQL to query and analyze datasets from multiple sources.
- Prepare reports, dashboards, and presentations using Microsoft Excel and PowerPoint.
- Collaborate with Level 1 and Level 2 SOC teams to identify, investigate, and respond to threats.
- Participate in briefings and technical discussions, deliver findings clearly to both technical and non-technical audiences.
Qualifications:
- Bachelor’s degree in Cybersecurity, Information Security, Computer Science, or related field.
- At least 3 years of equivalent experience in information security or cybersecurity.
- Proficient in Splunk and SPL/Search Processing Language.
- Working knowledge of Python, SQL, and data analytics.
- Familiarity with SOC operations, incident response, and cyber kill chain concepts.
- Expertise with Microsoft Office, especially Excel and PowerPoint.
- Excellent communication and presentation skills.
- Ability to pass or maintain a Peraton high background investigation or Secret clearance.
- Must be a U.S. Citizen.
Key Skills
Ranked by relevanceReady to apply?
Join Sigmaways Inc and take your career to the next level!
Application takes less than 5 minutes

