Security Operations Center (SOC) Analyst
Position Overview
The Security Operations Center (SOC) Analyst plays a critical role in protecting Calian customers nationwide by monitoring, detecting, and responding to cybersecurity threats. As a key member of the cybersecurity incident response team, the SOC Analyst serves as the first line of defense against security incidents.
This role offers hands‑on experience with advanced network and endpoint detection technologies, SIEM platforms, and incident response tools, supporting a comprehensive and evolving cybersecurity program.
The SOC Analyst is responsible for analyzing, identifying, and resolving security alerts and events in a fast‑paced, mission‑driven environment.
Responsibilities
Perform real‑time, proactive security monitoring, detection, and response to cybersecurity events
Conduct incident response activities including triage, analysis, containment, remediation, and recovery
Investigate security alerts generated by SIEM, IDS/IPS, antivirus, endpoint tools, and customer escalations
Identify indicators of compromise and recognize successful or attempted intrusions
Differentiate false positives from genuine security incidents
Launch, track, and manage investigations through resolution
Respond to security alerts and escalations in a timely and effective manner
Communicate investigation findings clearly to technical and non‑technical stakeholders
Maintain situational awareness of emerging threats, vulnerabilities, and mitigation strategies
Participate in the Computer Security Incident Response Team (CSIRT)
Provide on‑call support for after‑hours security‑related events
Perform other duties as assigned and support team objectives
Qualifications
Bachelor’s degree in Engineering, Computer Science, Information Security, Information Systems, or equivalent work experience
Experience working with security tools such as SIEM, IDS/IPS, antivirus, and endpoint detection platforms
Understanding of network architecture, TCP/IP, and network traffic capture and analysis
Experience reviewing Windows and Linux (
• nix) system and audit logs
Knowledge of vulnerability management and risk‑based security models
Familiarity with penetration testing tools, techniques, and methodologies
Programming or scripting experience preferred
Understanding of syslog functionality
Strong analytical, investigative, and problem‑solving skills
Excellent communication skills at both technical and business levels
Ability to work collaboratively in a team‑oriented, customer‑focused environment
Additional Requirements
Willingness to participate in an on‑call rotation for after‑hours incident response
Demonstrated commitment to customer satisfaction and respectful collaboration
Ability to perform essential job functions with or without reasonable accommodation
Experience in a customer‑service–oriented role preferred
Compensation
$65,000 - $70,000
Vacancy
We have 1 available position.
#J-18808-Ljbffr