×
Register Here to Apply for Jobs or Post Jobs. X

Security Analyst – Global Security Operations Center; SOC Part Time

Job in Sterling, Loudoun County, Virginia, 22170, USA
Listing for: Schubring Global Solutions
Part Time position
Listed on 2026-01-12
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, Network Security, Security Manager
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below
Position: Security Analyst – Global Security Operations Center (SOC) Part Time
Location: Sterling

Security Analyst – Global Security Operations Center (SOC) Part Time

About Schubring Global Solutions

Our approach is straightforward. Our team has been on both sides of the table, and we firmly believe in treating our customers the way we would expect to be treated. Every member of our team embraces our core values. We will not compromise our integrity and we will only act in our customers’ best interests.

As security practitioners, we embrace the impact of our actions and recommendations on our customers and their people. We operate as trusted partners…because that is what we are.

We are seeking a Security Analyst (SA) to become a valued member of our team supporting a rapidly growing global technology client.

The SA will be part of a GSOC team responsible for continuously monitoring the global network for breaches and anomalous activity. The SA will detect, analyze and limit intrusions and security events. The SA will work collaboratively to detect and respond to information security incidents; maintain and follow procedures for security event alerting; and participate in security investigations.

Additional responsibilities include such tasks as monitoring, research, classification, and analysis of security events that occur within our environment. The ideal candidate will have security industry knowledge that evolves with current and emerging vulnerabilities and threats, as well as an ongoing understanding of key business and technological processes.

Key Responsibilities
  • Assist in establishing a mature and optimized Security Operations Center discipline to support managed security services focused on vulnerability and security information event management engagements.
  • Monitor and analyze Security Information and Event Management (SIEM) and other tools to identify security issues for remediation.
  • Monitor and analyze alerts and notifications from multiple security systems.
  • Communicate, elevate, and/or mitigate alerts regarding intrusions and compromises to the enterprise.
  • Conduct operations surrounding cyber security incident response technologies including network logging and forensics, security information and event management tools, security analytics platforms, log search technologies, and host-based forensics as needed.
  • Perform scanning and monitoring activities to provide in-depth visibility into potential known and unknown vulnerabilities and threats that may pose risks to …
  • Document actions in cases to effectively communicate information to internal and external stakeholders.
  • Perform hunting for malicious activity across the network and digital assets.
  • Maintain incident logs with relevant activity.
  • Document investigation results, ensuring relevant details are passed to GSOC Lead and stakeholders.
  • Participate in root cause analysis or lessons learned sessions.
  • Establish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the Information Technology organization, as well as business units.
Education
  • Bachelor’s degree in Cybersecurity, Computer Science, or related focused technical training or 4 additional years of engineering and project management experience that may have been acquired in the military or public sectors.
Qualifications
  • 5 years of Information Technology experience, with at least 2 years of experience in information security working within security operations and 2 years’ experience monitoring threats via a SIEM console.
  • Detailed understanding of NIST Special Publication 800-61 Revision 2, Computer Security Incident Handling Guide.
  • Exceptional working knowledge of TCP/IP Networking and the OSI model.
  • In-depth knowledge of the Intelligence-driven defense utilizing the Cyber Kill Chain (CKC).
  • Significant experience performing analysis of log files from a variety of sources, including individual host logs, network traffic logs, firewall logs, or intrusion …
  • Significant experience with packet and malware analysis.
  • Strong customer service skills and decision-making skills.
  • Experience creating actionable content for a diverse range of commercial security tools and/or SIEM technologies.
  • Excellent problem solving, critical…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary