
Cyber Defense – SOC Analyst
WillHire
full-time
Posted on:
Location Type: Hybrid
Location: McLean • Virginia • United States
Visit company websiteExplore more
Salary
💰 $130,200 - $195,400 per year
Tech Stack
About the role
- Responsible for 24x7 security monitoring, alert triage, and initial investigation of security events
- Analyze alerts generated by SIEM tools such as Splunk and other integrated security platforms
- Determine impact and escalate when necessary
- Follow established playbooks and procedures while developing investigative skills and technical depth
Requirements
- 2+ years of experience in IT, cybersecurity, or related technical field
- Experience working with SIEM tools such as Splunk
- Understanding of basic networking concepts (TCP/IP, DNS, HTTP/S)
- Familiarity with Windows and Linux operating systems
- Associate’s or Bachelor’s degree in Cybersecurity, IT, or equivalent experience
- Strong analytical and critical thinking skills
- Ability to triage alerts and distinguish false positives from real threats
- Familiarity with common attack techniques such as phishing and malware
- Experience documenting investigations clearly and concisely
- Team-oriented mindset with willingness to learn from senior analysts
- Basic understanding of incident response lifecycle
- Certifications meeting DoD 8570 requirements
Benefits
- Workday Bonus Plan or role-specific commission/bonus
- Annual refresh stock grants
- Flexible work arrangements
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
SIEM toolsSplunknetworking conceptsTCP/IPDNSHTTP/SWindows operating systemLinux operating systemincident response lifecycleattack techniques
Soft Skills
analytical skillscritical thinking skillstriage alertsdistinguish false positivesdocument investigationsteam-oriented mindsetwillingness to learn
Certifications
DoD 8570 certifications