We are seeking a mid-level Tier 2 SOC Analyst to support one of our federal clients in identifying, analyzing, and responding to cybersecurity threats. As a Tier 2 Analyst, you will be responsible for conducting in-depth investigations, identifying threat patterns, and coordinating with incident response teams to ensure rapid containment and resolution of security incidents.
Role Description:
• Perform detailed analysis and triage of escalated alerts from Tier 1 analysts
Investigate anomalies in logs and alerts using tools such as SIEM, EDR, IDS/IPS, and packet capture systems
• Correlate threat intelligence and IOCs with internal telemetry to identify malicious activity
Assist in incident response activities: evidence collection, containment, eradication, and recovery
• Recommend improvements to detection rules and monitoring configurations
Write detailed incident reports, root cause analyses, and recommendations for remediation
• Interface with engineering teams to help tune SOC tools and maintain security controls
• Develop playbooks and automation scripts to improve SOC efficiency
• Mentor Tier 1 analysts and provide guidance on investigation and escalation procedures
Required Qualifications & Education:
• Bachelor’s degree in Cybersecurity, Computer Science, Information Security, or related field from a U.S. accredited college, university, or institution;
• Certifications: Security+, CySA+, CEH, or similar required; CISSP, GCIA, or GCIH preferred
• 3–5 years of experience in a cybersecurity or SOC environment
• Hands-on experience with SIEM platforms (e.g., Splunk, Microsoft Sentinel, QRadar)
• Working knowledge of threat actor tactics, techniques, and procedures (TTPs)
• Proficiency in log analysis, malware behavior analysis, and packet-level inspection
• Familiarity with security frameworks such as NIST 800-53, MITRE ATT&CK, and ISO 27001
• Excellent problem-solving skills and attention to detail
Desired Qualifications
• Experience with Microsoft Sentinel, CrowdStrike Falcon, ExtraHop, or Cisco SecureX
• Scripting knowledge in Python, PowerShell, or Bash for automation and log parsing
• Familiarity with cloud security monitoring (AWS, Azure, M365)
• Experience with vulnerability scanning tools (e.g., Nessus, Tenable, Qualys)
• Experience working in or supporting federal agencies or cleared environments
Clearance and Location Requirements
• Able to be cleared for a Public Trust clearance.
• This position requires to be onsite 3 days per week in Washington, DC.
We're ready to discuss your needs or dive in on your cyber defense journey. Let us know how we can help.
Contact us