Security Operations Center (SOC) Analyst

COLSA

Security Operations Center (SOC) Analyst

Huntsville, AL
Full Time
Paid
  • Responsibilities

    COLSA is seeking a highly motivated and technically skilled SOC Analyst to support a dynamic Watch Floor Team. This position is contingent upon contract award and will support 24/7/365 operations focused on detecting, responding to, and mitigating cyber threats in enterprise environments. As a SOC Analyst, you will be on the front lines of cyber defense—monitoring security events, triaging incidents, and supporting containment and recovery efforts. The ideal candidate thrives in high-pressure situations, stays calm under fire, and brings a sharp eye for anomalies, threats, and emerging attack vectors.

    Principal Duties and Responsibilities (*Essential Functions):

    • Monitor and analyze real-time cybersecurity alerts and events using tools like Splunk Enterprise Security and Microsoft Sentinel.
    • Detect and respond to suspicious or malicious activity across endpoints, networks, and cloud-based environments.
    • Execute initial triage, investigation, and escalation procedures for potential security incidents.
    • Document incidents and support detailed reporting to enable continuous improvement in detection and response.
    • Work closely with incident responders, threat intelligence, and engineering teams to support containment and remediation actions.
    • Participate in continuous monitoring operations to maintain a strong cybersecurity posture.
    • Support forensic and retrospective investigations as needed.
    • Maintain situational awareness of emerging threats and vulnerabilities impacting enterprise IT environments.

    At COLSA, people are our most valuable resource and centered at our core value. We invite you to unite your talents with opportunity and be a part of our “Family of Professionals!” Learn about our employee-centric culture and benefits here.

    Please note: This position is contingent upon contract award.

    Required Skills

    Required Experience

    Required Qualifications

    • Associate’s Degree or a Bachelor’s Degree in related field, or equivalent experience.
    • 2+ years of hands-on experience in a Security Operations Center (SOC) or cyber incident response environment.
    • Familiarity with SIEM platforms, particularly Splunk Enterprise Security
    • Understanding of network traffic analysis, endpoint monitoring, and common attack methodologies.
    • Excellent analytical and communication skills, with the ability to work calmly under pressure.
    • Willingness and ability to work rotating shifts, including nights, weekends, and holidays.
    • Active TS/SCI Clearance

    Preferred Qualifications

    • Experience using Microsoft Sentinel and other security monitoring tools.
    • Familiarity with ticketing systems, incident documentation processes, and operational reporting.
    • Understanding of MITRE ATT&CK framework and how it applies to detection strategies.
    • Strong foundation in host- and network-based forensics, malware analysis, or reverse engineering.

    Applicant selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information. COLSA Corporation is an Equal Opportunity Employer, Minorities/Females/Veterans/Disabled. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, or national origin.