×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

NL-Security Operations Center; SOC Analyst Concord, CA

Job in Concord, Contra Costa County, California, 94527, USA
Listing for: nLogic
Full Time position
Listed on 2026-03-01
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Position: NL-25-023 Security Operations Center (SOC) Analyst at nLogic Concord, CA

NL-25-023 Security Operations Center (SOC) Analyst job cord, CA. nLogic is hiring a Security Operations Center Analyst, also known as Local Defender, at Military Ocean Terminal Concord in Concord, California. The Local Defender is a critical cybersecurity role responsible for protecting the organization's digital assets through proactive monitoring, analysis, and response to cyber threats. This role combines the duties of a Security Operations Center (SOC) Analyst and Threat Analyst to ensure a holistic defense against emerging threats.

Work is performed on-site with occasional on-call duties for critical incidents in a collaborative, demanding environment requiring attention to emerging threats and vulnerabilities.

In this role, the candidate is expected to work with minimal guidance, in a cross‑functional team, ensuring reports and recommendations are effectively communicated and actioned to support the Government customer and mission requirements.

Duties Include:
  • SOC Activities and Duties
    • Monitor and analyze security events and alerts generated by SIEM platforms, firewalls, IDS/IPS, and endpoint detection tools to identify potential threats and anomalous behavior.
    • Analyze potential security incidents and investigate to determine the scope, impact, and root cause, and recommend effective remediation strategies.
    • Perform triage on security incidents to identify root causes and recommend appropriate mitigation measures.
    • Conduct regular reviews of SIEM reports to identify patterns, trends, and potential vulnerabilities within the organization's infrastructure.
    • Develop actionable recommendations based on SIEM data analysis to enhance detection capabilities, optimize alert configurations, and address identified gaps.
    • Escalate critical incidents to senior leadership or appropriate teams and provide detailed incident summaries with proposed mitigation actions.
    • Maintain accurate documentation of security events and incident‑handling procedures.
  • Threat Analysis and Intelligence
    • Monitor and evaluate Cyber Tasking Orders (CTOs) and other directives from NETCOM, ensuring compliance and timely implementation of mitigations.
    • Conduct research on the latest organization’s environment threat vectors, attack methodologies, and adversarial tactics, techniques, and procedures (TTPs).
    • Collaborate with other cybersecurity team members and the government customer to integrate threat intelligence into incident detection and response processes.
    • Analyze CVEs, security bulletins, threat intelligence feeds, and security advisories to assess their relevance and potential impact to the mission and the organization’s environment.
    • Correlate threat intelligence with SIEM findings to identify and assess emerging threats.
    • Develop and communicate proactive mitigation strategies based on threat landscape trends and adversary tactics.
  • Reporting and Communication
    • Generate detailed and actionable reports for leadership from SIEM platforms summarizing identified threats, incidents, and remediation steps.
    • Provide recommendations for improving the organization’s cybersecurity posture based on incident trends and threat intelligence.
    • Maintain clear communication with cross‑functional teams to ensure alignment with security objectives and protocols.
    • Generate detailed reports on threats, false positives, and actionable insights.
    • Provide the Government customer and leadership with concise, data‑driven recommendations for enhancing the organization’s cybersecurity defenses based on SIEM trends and incident analysis.
    • Prepare summaries and status updates of security posture improvements resulting from SIEM data analysis and implemented recommendations.
  • Security Tool Management and Optimization
    • Support the configuration, tuning, and optimization of security monitoring tools, including SIEM and threat detection platforms.
    • Conduct periodic reviews and updates of security tools to address gaps or inefficiencies.
    • Participate in the testing and implementation of new security technologies as required.
    • Collaborate with the team and the stakeholder community to fine‑tune SIEM configurations, including custom rule creation and log source integration, to improve threat…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary