NL-25-024 Security Operations Center (SOC) Analyst Job at nLogic, Mcalester, OK

T09ZZE9OckhTM0dwS00yNHR3WVBESVJ5
  • nLogic
  • Mcalester, OK

Job Description

n Logic is hiring a Security Operations Center Analyst, also known as Local Defender, in McAlester, Oklahoma. The Local Defender is a critical cybersecurity role responsible for protecting the organization's digital assets through proactive monitoring, analysis, and response to cyber threats. This role combines the duties of a Security Operations Center (SOC) Analyst and Threat Analyst to ensure a holistic defense against emerging threats. Key responsibilities include monitoring security logs, analyzing and reporting cyber incidents, reviewing Common Vulnerabilities and Exposures (CVEs), and implementing directives from NETCOM (e.g., Cyber Tasking Orders – CTO). Work is performed on-site with occasional on-call duties for critical incidents in a collaborative, demanding environment requiring attention to emerging threats and vulnerabilities. May require CONUS and/or OCONUS travel to customer sites

The preferred candidate will be well-versed in common cyber threats, vulnerabilities, and adversarial tactics, techniques, and procedures (TTPs). In this role, the candidate is expected to work with minimal guidance, in a cross-functional team, ensuring reports and recommendations are effectively communicated and actioned to support the Government customer and mission requirements.

Duties Include:
  • Monitor and analyze security events and alerts generated by SIEM platforms, firewalls, IDS/IPS, and endpoint detection tools to identify potential threats and anomalous behavior.
  • Perform basic system administration functions on the sensor capability systems and components, such as applying patches and updates.
  • Analyze data from installed OT sensors to identify patterns, trends, and assist with the reports generated regarding system performance and health.
  • Diagnose and resolve issues related to sensor data, including malfunctioning sensors, communication problems, and data integrity problems if necessary. 
  • Analyze potential security incidents and investigate to determine the scope, impact, root cause, and recommend effective remediation strategies.
  • Perform triage on security incidents to identify root causes and recommend appropriate mitigation measures.
  • Conduct regular reviews of SIEM reports to identify patterns, trends, and potential vulnerabilities within the organization's infrastructure.
  • Develop actionable recommendations based on SIEM data analysis to enhance detection capabilities, optimize alert configurations, and address identified gaps.
  • Escalate critical incidents to senior leadership or appropriate teams and provide detailed incident summaries with proposed mitigation actions.
  • Maintain accurate documentation of security events and incident-handling procedures.
  • Monitor and evaluate Cyber Tasking Orders (CTOs) and other directives from NETCOM, ensuring compliance and timely implementation of mitigations.
  • Conduct research on the latest organization’s environment threat vectors, attack methodologies, and adversarial tactics, techniques, and procedures (TTPs).
  • Collaborate with other cybersecurity team members and the government customer to integrate threat intelligence into incident detection and response processes.
  • Analyze CVEs, security bulletins, threat intelligence feeds, and security advisories to assess their relevance and potential impact to the mission and the organization’s environment.
  • Correlate threat intelligence with SIEM findings to identify and assess emerging threats.
  • Develop and communicate proactive mitigation strategies based on threat landscape trends and adversary tactics. 
  • Generate detailed and actionable reports for leadership from SIEM platforms summarizing identified threats, incidents, and remediation steps.
  • Provide recommendations for improving the organization’s cybersecurity posture based on incident trends and threat intelligence.
  • Maintain clear communication with cross-functional teams to ensure alignment with security objectives and protocols.
  • Generate detailed reports threats, false positives, and actionable insights.
  • Provide the Government customer and leadership with concise, data-driven recommendations for enhancing the organization’s cybersecurity defenses based on SIEM trends and incident analysis.
  • Prepare summaries and status updates of security posture improvements resulting from SIEM data analysis and implemented recommendations.
  • Support the configuration, tuning, and optimization of security monitoring tools, including SIEM and threat detection platforms.
  • Work with the team to improve the accuracy, reliability, and efficiency of OT sensor data collection and analysis.
  • Conduct periodic reviews and updates of security tools to address gaps or inefficiencies.
  • Participate in the testing and implementation of new security technologies as required.
  • Collaborate with the team and the stakeholder community to fine-tune SIEM configurations, including custom rule creation and log source integration, to improve threat detection accuracy.
  • Conduct periodic evaluations of SIEM and related tools, providing recommendations for feature enhancements or additional capabilities.
  • Support the testing and deployment of security solutions to ensure seamless integration with the existing monitoring infrastructure.
Required Skills and Experience:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field (or equivalent experience). Minimum of 3 related certifications may be used in place of related academic field.
  • 10+ years of experience in a SOC, cybersecurity, or related role.
  • Meet DoD and Army training and certification requirements for system administration (DODI 8570 IAT Level II).
  • Active DoD Secret Security Clearance.
  • Proficiency in analyzing security events, logs, and alerts from various security tools (e.g., SIEM, firewalls, IDS/IPS).
  • Familiarity with CVEs, threat intelligence frameworks (e.g., MITRE ATT&CK), and vulnerability management practices.
  • Knowledge of NETCOM policies, Cyber Tasking Orders (CTOs), and cybersecurity compliance requirements.
  • Strong analytical and problem-solving skills with attention to detail. 
Preferred Qualifications:
  • Experience with scripting languages (e.g., Python, PowerShell) for automating security tasks. 
  • Previous experience with OT Tenable.
  • Understanding of advanced threat detection methodologies and incident response processes. 
  • Excellent verbal and written communication skills for creating technical reports and presentations. 
  • One or more of the following certifications:
    • GIAC Penetration Tester (GPEN), Offensive Security Ceritifed Professional (OSCP), CISSP, CompTIA Security+, CySA+, CEH, GIAC certifications (e.g., GCIH, GCIA), Splunk Core Certified User / Power User, Cisco Certified CyberOps Associate
Candidate must be a U.S. Citizen. This position requires a SECRET Security Clearance. This is a full-time position that is fully onsite located at McAlester, Oklahoma.

Job Tags

Full time, Local area,

Similar Jobs

MTSS

Phlebotomy - Phlebotomist II Job at MTSS

 ...Requirements: Ability to provide quality, error free work in a fast-paced environment....  ...on-site supervision. Excellent phlebotomy skills to include pediatric and geriatric...  ...change; and knowledge of our business. Training locations may vary based on trainer... 

Red Bull

Merchandiser (Part Time) Job at Red Bull

 ...with customers. RESPONSIBILITIES Areas that play to your strengths All the responsibilities we'll trust you with: Ensure RedBull products are rotated and maintained following product rotation standards thereby minimizing Out of Code and Damaged Product... 

River Point Behavioral Health

PRN CERTIFIED CODER (CPC) ON SITE Job at River Point Behavioral Health

 ...time in dictation reports, deliver to unit and accurate medical record. Maintains and preserves daily electronic reports (i.e.: MIDAS, MS4, excel, P-Scribe, HCS) of Psychiatric Evaluations, Health & Physicals, and Discharge summaries for Health Information Management... 

Tomo Credit

Summer Marketing Internship - Graphic Design & Video Production Job at Tomo Credit

 ...Job Summary: As a Summer Marketing Intern, youll work closely with our creative and...  ...through compelling visuals and engaging videos. Your work will help shape how we show up...  ...using Adobe After Effects (Reels, TikToks, product explainers, etc.) Assist in storyboarding... 

GeoSearch, Inc.

Land Surveyor / Survey Technician Job at GeoSearch, Inc.

GeoSearch has an excellent opportunity for an entry-level survey technician close to the Triad/Piedmont area of North Carolina. Our client...  ...project managers in support of their duties and professional land surveyors in preparing land surveying documents. Adhere to OSHA...