We are seeking a mid-level Tier 2 SOC Analyst to support one of our federal clients in identifying, analyzing, and responding to cybersecurity threats. As a Tier 2 Analyst, you will be responsible for conducting in-depth investigations, identifying threat patterns, and coordinating with incident response teams to ensure rapid containment and resolution of security incidents.

Role Description:

• Perform detailed analysis and triage of escalated alerts from Tier 1 analysts

Investigate anomalies in logs and alerts using tools such as SIEM, EDR, IDS/IPS, and packet capture systems

• Correlate threat intelligence and IOCs with internal telemetry to identify malicious activity

Assist in incident response activities: evidence collection, containment, eradication, and recovery

• Recommend improvements to detection rules and monitoring configurations

Write detailed incident reports, root cause analyses, and recommendations for remediation

• Interface with engineering teams to help tune SOC tools and maintain security controls

• Develop playbooks and automation scripts to improve SOC efficiency

• Mentor Tier 1 analysts and provide guidance on investigation and escalation procedures

Required Qualifications & Education:

• Bachelor’s degree in Cybersecurity, Computer Science, Information Security, or related field from a U.S. accredited college, university, or institution;

• Certifications: Security+, CySA+, CEH, or similar required; CISSP, GCIA, or GCIH preferred

• 3–5 years of experience in a cybersecurity or SOC environment

• Hands-on experience with SIEM platforms (e.g., Splunk, Microsoft Sentinel, QRadar)

• Working knowledge of threat actor tactics, techniques, and procedures (TTPs)

• Proficiency in log analysis, malware behavior analysis, and packet-level inspection

• Familiarity with security frameworks such as NIST 800-53, MITRE ATT&CK, and ISO 27001

• Excellent problem-solving skills and attention to detail

Desired Qualifications

• Experience with Microsoft Sentinel, CrowdStrike Falcon, ExtraHop, or Cisco SecureX

• Scripting knowledge in Python, PowerShell, or Bash for automation and log parsing

• Familiarity with cloud security monitoring (AWS, Azure, M365)

• Experience with vulnerability scanning tools (e.g., Nessus, Tenable, Qualys)

• Experience working in or supporting federal agencies or cleared environments

Clearance and Location Requirements

• Able to be cleared for a Public Trust clearance.

• This position requires to be onsite 3 days per week in Washington, DC.

Washington, DC

Hybrid

Apply now

Need help? Lets talk.

We're ready to discuss your needs or dive in on your cyber defense journey. Let us know how we can help.

Contact us