Level 1 Security Analyst
Bloomington, MN
Contracted
Experienced
Position Overview
We are seeking a motivated and detail-oriented Level 1 Security Analyst to join our Cybersecurity Team on a 6-month contract. The ideal candidate will have prior experience in a SOC or similar threat monitoring environment, a strong desire to learn, and the ability to work collaboratively within a team. This role involves triaging security alerts, investigating incidents, and supporting threat detection and response efforts.
Desired Qualifications
Proficiency or hands-on experience with the following tools and concepts is required:
We are seeking a motivated and detail-oriented Level 1 Security Analyst to join our Cybersecurity Team on a 6-month contract. The ideal candidate will have prior experience in a SOC or similar threat monitoring environment, a strong desire to learn, and the ability to work collaboratively within a team. This role involves triaging security alerts, investigating incidents, and supporting threat detection and response efforts.
Desired Qualifications
- Prior experience in a SOC or similar security operations role.
- Strong desire to learn and grow in the cybersecurity field.
- Ability to follow direction and work effectively in a team environment.
- Excellent communication and documentation skills.
- Monitor and triage security alerts from various sources including SIEM, EDR, IDS/IPS, and threat intelligence platforms.
- Perform initial investigation and classification of security events.
- Escalate incidents based on severity and impact, following established playbooks and procedures.
- Collaborate with senior analysts and other IT teams to support incident response activities.
- Document findings, actions taken, and recommendations in case management/ticketing systems (e.g., SIEM, ServiceNow).
- Perform threat hunting and enrichment activities using MITRE ATT&CK and other frameworks.
- Continuously improve detection and response capabilities through feedback and learning.
Proficiency or hands-on experience with the following tools and concepts is required:
- SIEM Platforms: Splunk, QRadar, Sentinel, CrowdStrike
- IDS/IPS: Snort, Next-Generation Firewalls (NGFW)
- EDR Solutions: CrowdStrike, SentinelOne, Carbon Black
- Ticketing Systems: ServiceNow, SIEM cast management
- Security Domains:
- Network Security Monitoring
- Basic Malware Analysis
- Threat Intelligence Enrichment
- MITRE ATT&CK Framework
- Incident Investigation & Triage
- Threat Hunting
- SOC Analyst
- Security Analyst Level 1, 2
- Security Operations
- Threat Monitoring
- Security Event Analyst
- Cyber Defense Analyst
Apply for this position
Required*