Tier 1 SOC Analyst at ShorePoint
Washington, DC 20535, USA -
Full Time


Start Date

Immediate

Expiry Date

11 Sep, 25

Salary

0.0

Posted On

13 Jun, 25

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Communication Skills, Technical Discussions

Industry

Information Technology/IT

Description

WHO WE ARE:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.

WHO WE’RE LOOKING FOR:

We are seeking a Tier 1 SOC Analyst for a potential opportunity, with foundational experience in monitoring and analyzing cybersecurity events within federal environments. The ideal candidate will support real-time threat detection efforts and play a key role in identifying and escalating potential incidents. The Tier 1 SOC Analyst role focuses on continuous security monitoring, initial triage and incident tracking using automated tools and established response procedures. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market. Employment for this position is dependent on the successful award of the contract.

WHAT YOU NEED TO KNOW:

  • Experience using or familiarity with SIEM tools (e.g., Splunk, QRadar, ArcSight).
  • Understanding of basic network protocols (TCP/IP, DNS, HTTP/S) and system logs (Windows, Linux).
  • Ability to analyze security alerts, correlate events and identify potential incidents.
  • Strong verbal and written communication skills.
  • Willingness to work in a 24x7 operational environment, including shift work, weekends and holidays as needed.
  • Strong problem-solving skills and ability to lead technical discussions.
Responsibilities
  • Monitor and analyze security alerts and logs using SIEM tools (e.g., Splunk, QRadar, Elastic or equivalent).
  • Perform initial triage and analysis of security events, correlating data across multiple sources.
  • Identify indicators of compromise (IOCs), suspicious behavior and potential threats to federal systems.
  • Escalate incidents to Tier 2 analysts and follow documented incident response procedures.
  • Document all findings, incident details and analyst actions in the ticketing system with clarity and accuracy.
  • Participate in daily SOC briefings and provide real-time situational awareness to leadership.
  • Assist with tuning and filtering alerts to reduce false positives.
  • Work collaboratively with security engineers, network teams and system administrators during investigations.
  • Maintain awareness of the latest threats, vulnerabilities and threat actor techniques.
  • Support compliance and reporting efforts aligned with NIST, FISMA and agency-specific security policies.
Loading...