
Description
Description
SAIC is a leader in cybersecurity solutions, dedicated to protecting our clients from evolving cyber threats. We are seeking a motivated and detail-oriented Tier 1 SOC Analyst to join our Security Operations Center (SOC) team. As a Tier 1 SOC Analyst, you will be the first line of defense in monitoring and analyzing security events to protect our clients' digital assets.
The Tier 1 SOC Analyst will provide round-the-clock monitoring and analysis of Security Incident Event Management (SIEM) events to identify and respond to potential security risks and vulnerabilities. This role requires a keen eye for detail, strong analytical skills, and the ability to work effectively under pressure.
This role is 100% remote within the US
Key Responsibilities:
- Provide continuous monitoring and analysis of SIEM events to identify potential security risks and vulnerabilities.
- Triage security events and perform follow-up investigations to identify and categorize security incidents.
- Log security incidents using an Information Technology (IT) ticketing system, ensuring accurate documentation.
- Manage security incidents throughout their lifecycle, from detection to resolution.
- Coordinate with other technical teams to investigate, document, and resolve issues.
- Make recommendations to leadership for SIEM tuning and updates to enhance detection and response capabilities.
- Utilize threat intelligence sources to analyze events and identify threats and risks.
- Provide support for routine reporting tasks, ensuring timely and accurate delivery of reports.
- Support ad-hoc data and investigation requests as needed.
- Conduct security scans as directed using established processes and tools.
- Monitor and maintain communications for the SOC using contract-specific communication methods.
- Escalate complex incidents to the SOC Lead or Tier 2 Analyst as per contract requirements.
- Maintain documented SOC Service Line Agreements (SLA) for security alert monitoring.
- Perform additional duties as assigned to support SOC operations.
- Assist with Security Incident Response Team (SIRT) calls when required by Tier 2 and Tier 3 staff.
Qualifications
Education: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. Experience in lieu of degree will be considered
Experience: Minimum of 1 year of experience in a SOC environment or a related cybersecurity role is desired. 2+ years in an IT role
Certifications: Relevant certifications such as CompTIA Security+, CEH, or other cybersecurity certifications are desirable.
Ability to obtain clearance per the requirements of the role, citizenship required
Skills:
- Strong understanding of cybersecurity principles and SIEM tools.
- Excellent analytical and problem-solving abilities.
- Effective communication skills and ability to work in a team environment.
- Ability to work in a fast-paced, high-pressure setting.
- Proficiency in using IT ticketing systems and other SOC tools.
Benefits:
- Competitive salary and benefits package.
- Opportunities for professional development and growth.
- Collaborative and dynamic work environment.
Target salary range: Up to $40,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.
Apply on company website