Job Description
We’re seeking a Cybersecurity Analyst to support our federal cybersecurity operations center. This role requires more than just familiarity with firewalls and antivirus software. You’ll monitor real-time security alerts, perform deep-dive threat analysis, investigate complex intrusion attempts, and recommend actionable countermeasures to contain risks. Candidates must be skilled in navigating ambiguous threat landscapes, communicating technical findings clearly to non-technical stakeholders, and adapting quickly in an environment where zero-day vulnerabilities and advanced persistent threats (APTs) are the norm—not the exception.
You’ll be expected to challenge assumptions, escalate threats with confidence, and contribute to the continual refinement of detection rules, playbooks, and incident response procedures.
Key Responsibilities
- Monitor SIEM dashboards and analyze logs to identify anomalies, intrusions, and false positives across diverse endpoints, network traffic, and cloud infrastructure.
- Conduct threat hunting using threat intelligence, behavioral analytics, and MITRE ATT&CK framework.
- Triage and investigate security incidents, writing detailed incident reports and recommending corrective actions.
- Collaborate with DevOps and system administrators to harden configurations and minimize attack surfaces.
- Simulate adversarial behavior (purple teaming) to test detection capabilities and refine alerts.
- Maintain and improve security content in Splunk, Sentinel, or similar SIEM platforms (custom correlation rules, alerts, dashboards).
- Stay current on evolving tactics, techniques, and procedures used by threat actors targeting federal systems.
- Respond to audit requests and support compliance with NIST 800-53, FISMA, and FedRAMP.
Required Qualifications
- Bachelor’s degree in Cybersecurity, Computer Science, or related field OR equivalent work experience in threat detection and incident response.
- Minimum 3 years of hands-on experience in a SOC or cybersecurity operations role.
- Strong familiarity with packet analysis tools (Wireshark, Zeek), endpoint detection and response tools (CrowdStrike, Carbon Black), and scripting languages (Python, PowerShell, or Bash).
- Demonstrated experience using and tuning SIEM platforms such as Splunk ES, Microsoft Sentinel, or QRadar.
- Ability to interpret network and system logs and correlate data across sources to identify malicious activity.
- Deep understanding of TCP/IP, DNS, authentication mechanisms, and encryption protocols.
- Experience working in or with federal agencies or contractors is highly preferred.
- Excellent documentation and reporting skills—must be able to write concise, structured, and technically sound incident reports.
Preferred Qualifications
- Certifications such as GCIA, GCIH, GCFA, CEH, or OSCP.
- Familiarity with STIX/TAXII threat intelligence formats and integration into detection workflows.
- Experience with infrastructure-as-code (Terraform, Ansible) and cloud security posture management (especially AWS and Azure).
- Previous involvement in incident response tabletop exercises or red/blue/purple team simulations.
Are you interested in this position?
Apply by clicking on the “Apply Now” button below!
#GraphicDesignJobsOnline#WebDesignRemoteJobs #FreelanceGraphicDesigner #WorkFromHomeDesignJobs #OnlineWebDesignWork #RemoteDesignOpportunities #HireGraphicDesigners #DigitalDesignCareers#Dynamicbrandguru