SOC Analyst
Listed on 2026-01-25
-
IT/Tech
Cybersecurity
Overview
CGI Federal is looking for Cyber Security Analyst to support our Managed Security Services based out of Huntsville, AL. We provide Incident Management and Intrusion Detection services, along with Threat Hunting and in-depth analysis to our customers. Qualified applicants will be on the forefront of incident response where they will utilize the latest in network security technology to provide Computer Network Defense and Information Assurance (IA) support to CGI Federal and its customers.
Preferred location:
Huntsville, AL. Additional locations:
Lebanon, VA;
Fairfax, VA;
Belton, TX;
Lafayette, LA;
Knoxville, TN. A hybrid work model two days onsite per week is required by CGI policy.
- Understand and maintain the appropriate knowledge of tools, security procedures, and services within the CGI Federal Managed Security Services (MSS).
- Ensure that event analysis and incident reports are documented and quality control is applied to ensure accuracy.
- Assist in developing and maturing the future services and capabilities of the MSS, such as Threat Management, Penetration Assessments Activities, Tool & Automation Management, and more.
- Identify improvements within processes, procedures, policies, staffing, training, and tools to improve efforts and daily operations.
- Ensure that all procedures and operations are carried out as tasked.
- Responsible for shift activity logging and daily operations in terms of completing daily shift responsibilities.
- Understand and contribute to the improvement and direction of CGI Federal's MSS objectives, direction, and procedures.
- Maintain the ability to complete all MSS operations and procedures and ensure the proper escalation and leadership knowledge is provided.
- Ensure the proper documentation of tickets, shift documentation, correspondence, and escalations.
- Ensure events are handled at detection time according to established procedures.
- Demonstrate excellent communication and client care skills by documenting all activities within client delivery systems and communicating with client representatives in a timely manner.
- Stay informed of current events in the security industry including the latest exploits and threats as well as preventative measures, remediation, and restoration techniques.
- Act as the escalation point for client requests for information and presence.
- Mentor team members to improve quality and consistency of security information analysis of network traffic.
- Assist analysts in investigation and ticket creation efforts. Provide daily monitoring and alerting of events that occur within the near real time environment.
- Due to the nature of this government contract, US Citizenship is required
- Must pass client PoT investigation prior to onboarding
- BA or BS degree from a recognized university with specialization in Computer Sciences or a related discipline
- A minimum of three to five (3
- 5) years of directly related practical experience and demonstrated ability to carry out the functions of the job. - Hands on experience conducting incident response
- Experience working in an IT Security Operations Center using SANS methodology
- Experience and extensive knowledge of Security Information Event Management (experience with Google Sec Ops/Chronicle preferred)
- Experience in Intrusion Detection or Prevention Systems
- Knowledge of: TCP/IP, computer networking, routing and switching
- Experience in Linux/UNIX and Windows based devices at the System Administrator level
- System log forensics (Syslog, Event Viewer)
- Strong troubleshooting, reasoning and problem-solving skills
- Team player, excellent communication skills, good time management
- Organizational skills and the ability to work autonomously with attention to processes
- Ability to speak and communicate effectively with peers, management and clients
- Ability and experience in writing clear and concise technical documentation
- Ability to speak and write fluently in English
- Dual citizenship is not applicable for this role
- SIEM/SOAR experience (Splunk, Microsoft Sentinel, Google Sec Ops/Chronicle, Cortex XSOAR, Crowdstrike)
- Experience using ticketing systems such as Remedy, LANDesk, Service Now
- Experience creating, reviewing, & tuning automations in SOAR solutions
- Security +, Network +, CISSP, CEH, GCIA, GCIH, CISM, SPLUNK Training highly valued
- Knowledge of:
Strong Authentication, End Point Security, Internet Policy Enforcement, Firewalls, Web Content Filtering, Database Activity Monitoring (DAM), Public Key Infrastructure (PKI), Data Loss Prevention (DLP), Identity and Access Management (IAM) solutions
CGI is required by law in some jurisdictions to include a reasonable estimate of the compensation range for this role. The determination of this range includes various factors not limited to skill set, level, experience, relevant training, and licensure and certifications. To support the ability to reward for merit-based performance, CGI typically does not…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).