Security Analyst (Tier 1 SOC Analyst)

Overview

On Site
Contract - W2
Contract - 1 day((s))

Skills

Exposure to Splunk/Sentinel; basic MITRE ATT&CK; phishing triage; endpoint security

Job Details

Job Description, Day to Day, Education, Certification, etc.:

Security Analyst (Tier 1 SOC Analyst)

Department & Reporting Line: Information Security Department Office of Incident Response; reports to SOC Manager.

Position Summary/Purpose: First line of defense for monitoring dashboards, triaging alerts, investigating low/medium events, and escalating incidents meeting predefined thresholds.

Key Responsibilities:

i. Monitor and analyze SIEM, EDR, AV, and email security alerts; initiate tickets and escalate as needed

ii. Maintain activity logs; validate system health; follow SOPs and evolving playbooks

iii. Participate in shift briefings and tuning feedback; track threat trends and advisories

Required Qualifications: Associate/Bachelor's in related field or equivalent experience; 2+ years in IT support/network/helpdesk; preferred certifications Security+, MS SC-200, ISC2 SSCP.

Preferred Qualifications: Exposure to Splunk/Sentinel; basic MITRE ATT&CK; phishing triage; endpoint security.

Skills/Competencies: Attention to detail, analytical mindset, clear documentation /communication

Working Conditions & Clerance : Onsite SOC, rotating shifts including evenings /weekends/holiday/DHS Public Trust eligibilit

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.