SOC Analyst jobs in United States
info-icon
This job has closed.
company-logo

CGI · 7 hours ago

SOC Analyst

CGI Federal is a leading IT and business consulting services firm, seeking a Cyber Security Analyst to support their Managed Security Services in Huntsville, AL. The role involves incident management, intrusion detection, and threat hunting, utilizing the latest network security technology to ensure effective computer network defense and information assurance for clients.

AnalyticsApplication Performance ManagementBusiness IntelligenceConsultingCyber SecurityFinanceInformation TechnologyTechnical Support
badNo H1BnoteU.S. Citizen Onlynote

Responsibilities

Understand and maintain the appropriate knowledge of tools, security procedures, and services within the CGI Federal Managed Security Services (MSS)
Ensure that event analysis and incident reports are documented and quality control is applied to ensure accuracy
Assist in developing and maturing the future services and capabilities of the MSS, such as Threat Management, Penetration Assessments Activities, Tool & Automation Management, and more
Identify improvements within processes, procedures, policies, staffing, training, and tools to improve efforts and daily operations
Ensure that all procedures and operations are carried out as tasked
Responsible for shift activity logging and daily operations in terms of making sure that daily shift responsibilities are completed
Understand & contribute to the improvement and direction of CGI Federal's MSS objectives, direction, and procedures
Maintain the ability to complete all MSS operations and procedures and ensure the proper escalation and leadership knowledge is provided
Ensure the proper documentation of tickets, shift documentation, correspondence, and escalations
Ensure events are handled at detection time according to established procedures
Demonstrate excellent communication and client care skills by documenting all activities within our client delivery systems and communicating with client representatives in a timely manner
Stay informed of current events in the security industry including the latest exploits and threats as well as preventative measures, remediation, and restoration techniques
Act as the escalation point for client requests for information and presence
Mentor team members to improve quality and consistency of security information analysis of network traffic
Assist analysts in investigation and ticket creation efforts. Provide daily monitoring and alerting of events that occur within the near real time environment

Qualification

Incident responseSecurity Information Event ManagementIntrusion Detection SystemsTCP/IP networkingLinux/UNIX administrationWindows administrationSystem log forensicsSIEM/SOAR experienceTicketing systems experienceSecurity certificationsTroubleshooting skillsEnglish fluencyCommunication skillsTime managementOrganizational skillsTechnical documentation

Required

Due to the nature of this government contract, US Citizenship is required
Must pass client PoT investigation prior to onboarding
BA or BS degree from a recognized university with specialization in Computer Sciences or a related discipline
A minimum of three to five (3 - 5) years of directly related practical experience and demonstrated ability to carry out the functions of the job
Hands on experience conducting incident response
Experience working in an IT Security Operations Center using SANS methodology
Experience and extensive knowledge of Security Information Event Management (experience with Google SecOps/Chronicle preferred)
Experience in Intrusion Detection or Prevention Systems
Knowledge of: TCP/IP, computer networking, routing and switching
Experience in Linux/UNIX and Windows based devices at the System Administrator level
System log forensics (Syslog, Event Viewer)
Strong troubleshooting, reasoning and problem-solving skills
Team player, excellent communication skills, good time management
Organizational skills and the ability to work autonomously with attention to processes
Ability to speak and communicate effectively with peers, management and clients
Ability and experience in writing clear and concise technical documentation
Ability to speak and write fluently in English
Dual citizenship is not applicable for this role

Preferred

SIEM/SOAR experience (Splunk, Microsoft Sentinel, Google SecOps/Chronicle, Cortex XSOAR, Crowdstrike)
Experience using ticketing systems such as Remedy, LANDesk, ServiceNow
Experience creating, reviewing, & tuning automations in SOAR solutions
Security +, Network +, CISSP, CEH, GCIA, GCIH, CISM, SPLUNK Training highly valued
Knowledge of: Strong Authentication, End Point Security, Internet Policy Enforcement, Firewalls, Web Content Filtering, Database Activity Monitoring (DAM), Public Key Infrastructure (PKI), Data Loss Prevention (DLP), Identity and Access Management (IAM) solutions

Benefits

Competitive compensation
Comprehensive insurance options
Matching contributions through the 401(k) plan and the share purchase plan
Paid time off for vacation, holidays, and sick time
Paid parental leave
Learning opportunities and tuition assistance
Wellness and Well-being programs

Company

CGI is an IT and business consulting services firm that offers consulting, cyber security, cloud, and IT services.

Funding

Current Stage
Public Company
Total Funding
$1.2B
2025-03-12Post Ipo Debt· $650M
2024-09-03Post Ipo Debt· $550.87M
1998-10-06IPO

Leadership Team

leader-logo
François Boulanger
President and Chief Executive Officer at CGI
linkedin
leader-logo
Raymond McMann
VP, Global Oil & Gas Industry
linkedin
Company data provided by crunchbase