Search for More Jobs
Get alerts for jobs like this Get jobs like this tweeted to you
Company: SAIC
Location: REMOTE WORK, TX
Career Level: Associate
Industries: Technology, Software, IT, Electronics

Description

Description

SAIC is a leader in cybersecurity solutions, dedicated to protecting our clients from evolving cyber threats. We are seeking a motivated and detail-oriented Tier 1 SOC Analyst to join our Security Operations Center (SOC) team. As a Tier 1 SOC Analyst, you will be the first line of defense in monitoring and analyzing security events to protect our clients' digital assets.

The Tier 1 SOC Analyst will provide round-the-clock monitoring and analysis of Security Incident Event Management (SIEM) events to identify and respond to potential security risks and vulnerabilities. This role requires a keen eye for detail, strong analytical skills, and the ability to work effectively under pressure.

This role is 100% remote within the US

Key Responsibilities:

  • Provide continuous monitoring and analysis of SIEM events to identify potential security risks and vulnerabilities.
  • Triage security events and perform follow-up investigations to identify and categorize security incidents.
  • Log security incidents using an Information Technology (IT) ticketing system, ensuring accurate documentation.
  • Manage security incidents throughout their lifecycle, from detection to resolution.
  • Coordinate with other technical teams to investigate, document, and resolve issues.
  • Make recommendations to leadership for SIEM tuning and updates to enhance detection and response capabilities.
  • Utilize threat intelligence sources to analyze events and identify threats and risks.
  • Provide support for routine reporting tasks, ensuring timely and accurate delivery of reports.
  • Support ad-hoc data and investigation requests as needed.
  • Conduct security scans as directed using established processes and tools.
  • Monitor and maintain communications for the SOC using contract-specific communication methods.
  • Escalate complex incidents to the SOC Lead or Tier 2 Analyst as per contract requirements.
  • Maintain documented SOC Service Line Agreements (SLA) for security alert monitoring.
  • Perform additional duties as assigned to support SOC operations.
  • Assist with Security Incident Response Team (SIRT) calls when required by Tier 2 and Tier 3 staff.

Qualifications

Education: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. Experience in lieu of degree will be considered
Experience: Minimum of 1 year of experience in a SOC environment or a related cybersecurity role is desired. 2+ years in an IT role
Certifications: Relevant certifications such as CompTIA Security+, CEH, or other cybersecurity certifications are desirable.

Ability to obtain clearance per the requirements of the role, citizenship required

Skills:

  • Strong understanding of cybersecurity principles and SIEM tools.
  • Excellent analytical and problem-solving abilities.
  • Effective communication skills and ability to work in a team environment.
  • Ability to work in a fast-paced, high-pressure setting.
  • Proficiency in using IT ticketing systems and other SOC tools.


Benefits:

  • Competitive salary and benefits package.
  • Opportunities for professional development and growth.
  • Collaborative and dynamic work environment.

Target salary range: Up to $40,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.


 Apply on company website