Join our team to monitor detect and respond to security incidents across the enterprise. The analyst will help protect mission-critical GPO systems by triaging alerts correlating threat data and supporting incident response activities.
This position is contingent upon contract award.
Location: Remote with periodic on-site meetings in Washington DC Clearance: Public Trust (or ability to obtain)
Responsibilities:
Monitor SIEM dashboards and alerts (Microsoft Sentinel Defender)
Investigate incidents and recommend remediation actions
Support log analysis and correlation from cloud and on-prem sources
Produce documentation including incident reports detection playbooks SOPs
Qualifications:
3 years of SOC experience in federal or enterprise settings
Expertise with Microsoft Sentinel Trellix Stealthwatch and NetWitness
Strong understanding of threat detection and response frameworks
ASSYST is an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to race color religion sex age disability military status national origin or any other characteristic protected under federal state or applicable local law
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.