Cyber Security Analyst – SOC Support Position Available In Escambia, Florida
Tallo's Job Summary: GBSI is seeking a Cyber Security Analyst - SOC Support in Pensacola, FL, with a salary range of $84k to $136k per year. Responsibilities include monitoring and responding to security alerts, analyzing activity on various technology systems, and coordinating incident response efforts. Qualifications include a Bachelor's or Master's degree in IT or related fields, along with specific security certifications and experience in incident response.
Job Description
Salary Not Available
Position range in Florida $84k
- $136k Per Year Cyber Security Analyst
- SOC Support
Global Business Solutions, LLC
Occupation:
Information Security Analysts
Location:
Pensacola, FL
- 32534
Positions available: 1
Job #: 8002
Source:
Global Business Solutions, Inc.
Posted:
4/16/2025
Web Site:
www.gbsi.com
Job Type:
Full Time (30 Hours or More) Job Requirements and Properties Help for Job Requirements and Properties. Opens a new window. Job Requirements and Properties Help for Job Requirements and Properties. Opens a new window. Job Description Help for Job Description. Opens a new window. Job Description Help for Job Description. Opens a new window.
CONTRACT AWARDED. ANTICIPATED TIME TO FILL
FALL 2025 Overview
GBSI is seeking an Information Technology (IT) professional for the role of Cyber Security Analyst
- SOC Support in Pensacola, FL to work with an elite team of IT professionals to maintain an optimal environment for critical systems.
The Cyber Security Analyst for the Security Operations Center (SOC) will provide a full range of cyber security services, with a focus on monitoring and responding to alerts of high or critical findings within Intrusion Detection and Security logs while using state of the art security systems for detection and response. This includes everything from threat prevention to security infrastructure design to incident detection and responsibilities. Responsibilities
- Tracks and analyzes activity on servers, endpoints, networks, applications, databases, websites on other technology systems;
- Provides a critical layer of analysis needed to seek out any irregular activity that could suggest a security incident;
- Applies techniques for detecting host and network-based intrusions using intrusion detection technologies;
- Operates security monitoring, investigation, and reporting tools;
- Provides daily operational oversight of incidents and alerting from multiple platforms;
- Creates, manages, and dispatches incident tickets associated with deception detections and alerts;
- Identifies necessary tools or processes to improve the efficacy of the team;
- Receives, analyzes, and responds to alerts, to include after hours, holidays, and weekends during incidents or priority events;
- Coordinates with Managed Security Service Provider(s) to investigate events and incidents;
- Designs and coordinates the build out of the Security Operations Center (SOC) processes and procedures;
- Develops and maintains the SOC framework;
- Provides security reports and metrics;
- Performs incident identification and triage according to NIST standards;
- Assists with annual Security Incident tabletop testing;
- Performs network and host forensics in response to security events and incidents;
- Analyzes malware and other attacker Tactics, Techniques, and Procedures (TTPs) in response to security events and incidents;
- Tracks and analyzes activity on servers, endpoints, networks, applications, databases, websites and other technology systems;
- Provides a critical layer of analysis needed to seek out any irregular activity that could suggest a security incident;
- Builds constructive relationships with internal and external stakeholders, and mentors security operations analysts;
- Provides on-the-job training, mentoring, and guidance/oversight for new and/or junior analysts;
- Performs threat hunts in addition to developing and maintaining threat hunting strategies;
- Maintains understanding of current events, latest threats, and industry trends relating to information security. Additional Information Help for Additional Information. Opens a new window. Additional Information Help for Additional Information. Opens a new window.
Qualifications - Bachelor’s degree in Information Technology, Computer Science, Mathematics, Statistics, Business, Engineering, or management information systems and six (6) years of experience is required; OR
- Master’s degree in Information Technology, Computer Science, Mathematics, Statistics, Business, Engineering, or management information systems and three (3) years experience is required;
- Active DoD-issued Top Secret with Sensitive Compartmented Information (TS/SCI) Security Clearance is required at start;
- ISACA Certified Information Security Manager (CISM) Certification is required, in addition to one or more of the following technical security certifications:
- GCIH
- GIAC Certified Incident Handler
- SSOC
- GIAC Security Operations Certified
- GMON
- GIAC Continuous Monitoring Certifications
- Ten (10) years’ experience leading and coordinating incident response efforts in relation to information security events, chronologically summarizing incidents and document incident reports, leading analysis, and remediation efforts among various teams within the organization, managing process documentation, providing metrics to leadership, standing up meetings and incident coordinating for information security incidents is required; • Ability to demonstrate own technical development in one or more of the following areas: Detection, Cyber Intelligence, Monitoring, Analysis; • Ability to lead and independently triage, analyze, and respond to information security alerts, in
Visit the Employer site for more details Help for Employer Information.
Opens a new window.