Job Title: Security Operations Center (SOC) Analyst
Location: Dover Delaware 19901
Experience Required: 12 Years
Employment Type: Contract
About the Role We are looking for a highly experienced SOC Analyst to join our team on a contract this role you will be responsible for monitoring analyzing and responding to security threats across the organization. You will work closely with internal IT teams security engineers and leadership to proactively identify risks and maintain a secure environment.
Key Responsibilities -
Monitor security alerts and events across SIEM and other security tools.
-
Perform real-time analysis of security threats incidents and anomalies.
-
Investigate security events to determine severity impact and required response.
-
Conduct threat hunting activities to identify potential vulnerabilities or suspicious patterns.
-
Manage incident response processes from detection to resolution.
-
Create incident reports documentation and recommendations for prevention.
-
Work with internal teams to ensure security controls and policies are enforced.
-
Maintain and improve SOC monitoring processes and playbooks.
-
Perform log analysis network traffic review and malware analysis as needed.
-
Support audits compliance processes and risk assessments.
-
Collaborate with third-party security service providers and vendors.
-
Stay updated on cybersecurity trends threat intelligence and emerging attack methods.
Required Skills and Experience -
12 years of experience in cybersecurity or SOC operations.
-
Strong hands-on experience with SIEM tools such as Splunk QRadar ArcSight Sentinel or similar.
-
Deep understanding of network security firewalls IPS/IDS endpoint security and vulnerability management.
-
Knowledge of common attack techniques malware behavior and threat analysis frameworks (MITRE ATT&CK Cyber Kill Chain).
-
Experience with incident response methodologies and digital forensics.
-
Strong analytical and problem-solving abilities.
-
Ability to work independently under pressure and manage multiple incident priorities.
-
Excellent communication and documentation skills.
Preferred Qualifications -
Professional certifications such as CISSP CISM CEH GCIH GCIA Security or similar.
-
Experience working in enterprise SOC environments managed security services or government environments.
-
Familiarity with scripting for automation (Python PowerShell Bash) is a plus.
Job Title: Security Operations Center (SOC) Analyst Location: Dover Delaware 19901 Experience Required: 12 Years Employment Type: Contract About the Role We are looking for a highly experienced SOC Analyst to join our team on a contract this role you will be responsible for monitoring analyzing and...
Job Title: Security Operations Center (SOC) Analyst
Location: Dover Delaware 19901
Experience Required: 12 Years
Employment Type: Contract
About the Role We are looking for a highly experienced SOC Analyst to join our team on a contract this role you will be responsible for monitoring analyzing and responding to security threats across the organization. You will work closely with internal IT teams security engineers and leadership to proactively identify risks and maintain a secure environment.
Key Responsibilities -
Monitor security alerts and events across SIEM and other security tools.
-
Perform real-time analysis of security threats incidents and anomalies.
-
Investigate security events to determine severity impact and required response.
-
Conduct threat hunting activities to identify potential vulnerabilities or suspicious patterns.
-
Manage incident response processes from detection to resolution.
-
Create incident reports documentation and recommendations for prevention.
-
Work with internal teams to ensure security controls and policies are enforced.
-
Maintain and improve SOC monitoring processes and playbooks.
-
Perform log analysis network traffic review and malware analysis as needed.
-
Support audits compliance processes and risk assessments.
-
Collaborate with third-party security service providers and vendors.
-
Stay updated on cybersecurity trends threat intelligence and emerging attack methods.
Required Skills and Experience -
12 years of experience in cybersecurity or SOC operations.
-
Strong hands-on experience with SIEM tools such as Splunk QRadar ArcSight Sentinel or similar.
-
Deep understanding of network security firewalls IPS/IDS endpoint security and vulnerability management.
-
Knowledge of common attack techniques malware behavior and threat analysis frameworks (MITRE ATT&CK Cyber Kill Chain).
-
Experience with incident response methodologies and digital forensics.
-
Strong analytical and problem-solving abilities.
-
Ability to work independently under pressure and manage multiple incident priorities.
-
Excellent communication and documentation skills.
Preferred Qualifications -
Professional certifications such as CISSP CISM CEH GCIH GCIA Security or similar.
-
Experience working in enterprise SOC environments managed security services or government environments.
-
Familiarity with scripting for automation (Python PowerShell Bash) is a plus.
View more
View less