Full-Time

Security Analyst – Global Security Operations Center (SOC)

Posted on 7/7/2025

Schubring Global Solutions

Schubring Global Solutions

Compensation Overview

$38.46/hr

Dulles, VA, USA

In Person

Category
IT & Security (1)
Requirements
  • Five years of Information Technology experience, with at least two years of experience in information security working within security operations and two years’ experience monitoring threats via a SIEM console.
  • Detailed understanding of NIST Special Publication 800-61 Revision 2, Computer Security Incident Handling Guide.
  • Exceptional working knowledge of TCP/IP Networking and the OSI model.
  • In-depth knowledge of the Intelligence-driven defense utilizing the Cyber Kill Chain.
  • Significant experience performing analysis of log files from a variety of sources, including individual host logs, network traffic logs, firewall logs, or intrusion prevention logs.
  • Significant experience with packet and malware analysis.
  • Strong customer service skills and decision-making skills.
  • Experience creating actionable content for a diverse range of commercial security tools and/or SIEM technologies.
  • Excellent problem solving, critical thinking, and analytical skills with the ability to deconstruct problems.
  • Possess Microsoft SC-200: Microsoft Security Operations Analyst or the ability to obtain within 90 days of hire.
  • Bachelor’s degree in Cybersecurity, Computer Science, or related focused technical training or 4 additional years of engineering and project management experience that may have been acquired in the military or public sectors.
Responsibilities
  • Assist in establishing a mature and optimized Security Operations Center discipline to support managed security services focused on vulnerability and security information event management engagements.
  • Monitor and analyze Security Information and Event Management (SIEM) and other tools to identify security issues for remediation.
  • Monitor and analyze alerts and notifications from multiple security systems.
  • Communicate, escalate, and/or mitigate alerts regarding intrusions and compromises to the enterprise.
  • Conduct operations surrounding cyber security incident response technologies including network logging and forensics, security information and event management tools, security analytics platforms, log search technologies, and host-based forensics, as needed.
  • Perform scanning and monitoring activities to provide in-depth visibility into potential known and unknown vulnerabilities and threats that may pose risks to our environment.
  • Document actions in cases to effectively communicate information to internal and external stakeholders.
  • Perform hunting for malicious activity across the network and digital assets.
  • Maintain incident logs with relevant activity.
  • Document investigation results, ensuring relevant details are passed to GSOC Lead and stakeholders.
  • Participate in root cause analysis or lessons learned sessions.
  • Establish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the Information Technology organization, as well as business units.
Desired Qualifications
  • Possess relevant certifications, such as Certified Information Systems Security Professional or Associate, EC Council Certified Ethical Hacker (CEH), or Formal IT Security/Network Certification such as SANS GIAC Certified Intrusion Analyst (GCIA), SANS GIAC Network Forensic Analyst (GNFA), or SANS GIAC Certified Incident Handler (GCIH).
Schubring Global Solutions

Schubring Global Solutions

View

Company Size

N/A

Company Stage

N/A

Total Funding

N/A

Headquarters

N/A

Founded

N/A

INACTIVE