Skip to content
mimi

Tier III SOC Analyst

Blu Omega

Herndon · flexible Full-time Senior Today

About the role

Position Overview

Blu Omega is seeking a Tier III SOC Analyst to support the TSA Continuous Diagnostics and Mitigation (CND) program in a high-visibility Security Operations Center (SOC) environment. This individual will serve as a senior-level resource responsible for advanced threat detection, incident response, and security analysis. The ideal Candidate is capable of operating independently, can quickly acclimate to the environment, and thrives in a fast-paced, mission-critical setting with evolving priorities.

Key Responsibilities

  • Monitor, analyze, and triage security events and alerts generated by the client’s SIEM in a 24x7x365 SOC environment
  • Perform advanced incident response activities, including investigation, containment, eradication, and recovery
  • Conduct deep-dive analysis of security alerts to identify malicious activity and potential threats
  • Analyze logs and data from various sources including firewalls, IDS/IPS, endpoints, and network devices
  • Leverage tools such as Splunk, Tanium, Trellix (McAfee ePO), Zscaler, Microsoft Defender, and FireEye for threat detection and response
  • Escalate and coordinate incidents as appropriate, providing detailed documentation and reporting
  • Support continuous improvement of SOC processes, detection use cases, and response procedures
  • Maintain awareness of emerging threats, vulnerabilities, and attack vectors

Required Qualifications

  • Minimum of 4 years of experience in a SOC or NOC environment performing security monitoring and analysis
  • Strong experience with SIEM platforms, specifically Splunk
  • Hands-on experience with EDR tools supporting incident investigations
  • Solid understanding of the incident response lifecycle
  • Working knowledge of operating systems including Windows, Linux, and macOS
  • Strong understanding of network protocols and communications (TCP, UDP, ICMP, BGP, MPLS)
  • Familiarity with common enterprise services and protocols (DNS, DHCP, HTTP/HTTPS, SMTP, SQL)
  • Experience analyzing logs from firewalls, IDS/IPS, and other security infrastructure
  • Ability to operate effectively in a fast-paced environment with shifting priorities

Preferred Qualifications

  • Experience in a federal or government SOC environment
  • Exposure to enterprise security tooling including Tanium, Trellix, Zscaler, Microsoft Defender, and FireEye
  • Strong analytical and problem-solving skills
  • Prior experience operating in shift-based environments

Education

  • High School Diploma required (higher education preferred)

Additional Details

  • Initial support will align to day shift, with potential transition to shift work (front half nights or back half days) after onboarding
  • Flexibility to support alternate shifts is highly preferred
  • Two-step interview process
  • Immediate need, though full TSA EOD process is required prior to start
  • Opportunity extends into option year

Skills

BGPDHCPDNSDockerEDRFireEyeFirewallsHTTP/HTTPSICMPIDS/IPSLinuxmacOSMcAfee ePOMicrosoft DefenderMPLSNOCOperating SystemsProtocolsSecurity AnalysisSIEMSMTPSOCSplunkSQLTaniumTCPThreat DetectionTrellixUDPVulnerabilitiesWindowsZscaler

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free