Position Details
About this role
Tier 1 SOC Analyst for HUD program, remotely monitoring network, endpoint, and cloud environments. Analysts triage alerts, identify incidents, perform initial response, and escalate to Tier 2/3 while supporting security operations and compliance.
Key Responsibilities
- Perform continuous security monitoring of network, endpoint, and cloud environments in a 24/7/365 SOC
- Analyze and triage security alerts from SIEM, SOAR, EDR, and other security tools
- Identify potential security incidents including malware, phishing, unauthorized access, and anomalous behavior
- Execute initial incident response procedures and escalate incidents to Tier 2/3 analysts as required
- Monitor and analyze security logs, events, and alerts for suspicious activity
Technical Overview
Hands-on in SIEM (Splunk), EDR, log analysis; understanding of networking and operating systems; incident response lifecycle; uses ServiceNow for ticketing; supports federal cybersecurity requirements.
Ideal Candidate
The ideal candidate is an entry-level SOC Analyst with 1–2 years of security operations experience, comfortable with Splunk SIEM, EDR, and incident triage. They should understand networking and incident response processes and be capable of working remotely to support HUD security monitoring.
Must-Have Skills
Tools & Platforms
Required Skills
Hard Skills
Soft Skills
Industry & Role
Keywords for Your Resume
Deal Breakers
Lack of 1–2 years SOC experience, Inability to obtain or maintain Public Trust clearance, Lack of familiarity with SIEM (Splunk) or EDR tools
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile