What are the responsibilities and job description for the Security Operations Center (SOC) Analyst position at Dark Wolf Solutions?
Dark Wolf Solutions is seeking a highly motivated and detail-oriented Security Operations Center (SOC) Analyst with a strong technical background and experience in security operations to join our team. The SOC Analyst will play a critical role in ensuring the security of our organization's infrastructure and data by monitoring, analyzing, and responding to security events and incidents. This role supports the Sentinel Security mission by taking proactive measures to prevent regulatory failures, compliance violations, and material data breaches. This role is based off Hill AFB full time in Ogden, UT. Key responsibilities include, but are not limited to:
- Using SIEM tools and event monitoring technologies to analyze alerts and identify potential security incidents.
- Working with technologies including Next Generation Firewalls, IDS/IPS, web proxies, VPNs, NAC, NetFlow tools, SDWAN, and other monitoring platforms.
- Engaging in basic threat hunting activities to detect and mitigate potential risks.
- Responding to security events by following pre-defined playbooks and developing new runbooks in SOAR platforms.
- Conducting incident response (IR) activities to contain, analyze, and remediate security breaches.
- Using tools such as Nmap and Wireshark for network discovery and analysis.
- Hardening network devices, servers, and endpoints against vulnerabilities.
- Following best practices for securing Windows, Linux, and MacOS environments.
- Monitoring and securing cloud environments (AWS, Azure, GCP), adhering to best practices for cloud security.
- Researching and implementing security tools and processes to improve SOC efficiency.
- Leveraging automation to streamline repetitive tasks and enhance incident response workflows.
- Staying current with industry trends, vulnerabilities, and emerging threats.
Required Qualifications:
- 3 years of experience in a SOC or security operations role
- Familiarity with monitoring and securing networks
- Basic experience with logging technologies, threat hunting, and creating playbooks for SOAR platforms
- Knowledge of security best practices for hardening systems and incident response workflows
- Experience with tools such as NMAP, Wireshark, and other network discovery platforms
- Working knowledge of security certifications such as CISSP, CEH, or GSEC is highly desirable
- Strong curiosity, initiative, persistence, and creativity when solving complex problems
- Automation skills to improve SOC operations are a plus
- Hands-on experience with orchestration and observability tools is a plus
- Bachelor’s degree in Computer Science, Information Technology, or a related field
- US Citizenship and an active Secret security clearance required
Desired Qualifications:
- Experience performing cybersecurity activities in support of software and system requirements, design, development, testing, and sustainment
- Experience with HBSS, ACAS, SCAP Compliance Checker (SCC), DISA STIGs
- Working knowledge of NIST 800-53 Security and Privacy Controls
- Experience with RHEL
- Experience in performing post-incident computer forensics without destruction of critical data
- Ability to provide guidance on DoD Cyber regulations and requirements to engineering and software development staff
This role is located in Ogden, UT.
We are proud to be an EEO/AA employer Minorities/Women/Veterans/Disabled and other protected categories.
In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire.