✦ Luna Orbit — Cybersecurity

SOC Analyst I

at Northern Technologies Group

📍 Tampa, FL, US Onsite 💰 $50K – $55K USD / year Posted April 09, 2026
Salary $50K – $55K USD / year
Type Full-Time
Experience entry
Exp. Years 2+ years
Education Associate or bachelor’s degree in cybersecurity, computer science, or related field
Category Cybersecurity

Northern Technologies Group is hiring a SOC Analyst I (SOC Tier 1 Analyst) to monitor client security events, analyze alerts, triage incidents, and escalate complex cases to higher tiers. The role includes shift work across nights, weekends, and holidays to support 24/7/365 SOC operations.

  • Monitor security alerts and events
  • Analyze and triage security incidents
  • Perform initial investigation and containment
  • Document incident timelines and artifacts
  • Escalate incidents to Tier 2 or Tier 3 analysts

You will monitor security alerts from SIEM, IDS/IPS, firewalls, and endpoint protection systems, then conduct initial investigations and containment. The job also requires Splunk-based security event monitoring and log analysis, as well as incident documentation and tracking through ticketing systems such as ServiceNow, Jira, and Microsoft Dynamics.

The ideal candidate is a US-based SOC Tier 1 analyst with 2+ years of cybersecurity or Security Operations Center (SOC) experience. They can monitor SIEM alerts, perform incident triage and containment, document timelines and artifacts, escalate incidents appropriately, and use Splunk and ticketing systems (ServiceNow, Jira, Microsoft Dynamics) to track responses.

2+ years of experience in cybersecuritySecurity Operations Center (SOC)or related information security rolesStrong understanding of cybersecurity principles and common attack vectorsMonitor security alerts and events generated by various security tools including SIEMIDS/IPSfirewallsand endpoint protection systemsAnalyze and triage security incidentsPerform initial investigation and containment of security incidentsDocument incident detailsEscalate complex incidents to Tier 2 or Tier 3 analystsUse ticketing systems to trackdocumentand escalate security incidentsSplunk for security event monitoringlog analysisand incident investigation
SIEM (Security Information and Event Management)IDS/IPS (Intrusion Detection System / Intrusion Prevention System)firewallsendpoint protection systemsSplunkEDR (Endpoint Detection and Response)Microsoft DefenderCrowdStrikeSophosSentinelOneMicrosoft DynamicsServiceNowJira
Security Operations Center (SOC)SIEM (Security Information and Event Management)IDS/IPS (Intrusion Detection System / Intrusion Prevention System)firewallsendpoint protectionincident triageincident containmentincident documentationincident escalationSplunklog analysisincident investigationticketing systemsMicrosoft DynamicsServiceNowJiraEDR (Endpoint Detection and Response)Microsoft DefenderCrowdStrikeSophosSentinelOne
Security Operations Center (SOC)security event monitoringalert triageincident escalationincident containmentincident documentationSIEM (Security Information and Event Management)IDS/IPS (Intrusion Detection System / Intrusion Prevention System)firewallsendpoint protection systemsproblem-solvingsecurity incident analysisclient incident communicationthreat and vulnerability awarenessSplunklog analysisincident investigationticketing systemsMicrosoft DynamicsServiceNowJiraEDR (Endpoint Detection and Response)Microsoft DefenderCrowdStrikeSophosSentinelOneUS citizenship requirement
effective communicationability to convey technical information to technical and non-technical stakeholdersattention to detailcross-functional collaborationknowledge sharingtimely updates and communication to clientsteamwork

Preferred

CompTIA Security+ISC2 Certified in Cybersecurity
Industry Consulting
Job Function Provide Tier 1 SOC monitoring, alert triage, and initial incident response for client environments.
Role Subtype SOC Analyst L1
Tech Domains Cybersecurity, ITSM / ServiceNow, Splunk, Networking / TCP-IP
Visa Sponsorship No
SOC Analyst ISOC Tier 1 AnalystSOC AnalystSecurity Operations Center (SOC)SIEMSecurity Information and Event ManagementIDS/IPSIntrusion Detection SystemIntrusion Prevention Systemfirewallsendpoint protectionEDREndpoint Detection and ResponseSplunkSplunk for security event monitoringlog analysisincident investigationincident triageincident escalationincident containmentSecurity incident documentationticketing systemsMicrosoft DynamicsServiceNowJiraCompTIA Security+ISC2 Certified in CybersecurityUS Citizen

Must be a US Citizen, Must have 2+ years of experience in cybersecurity, SOC, or related roles, Must demonstrate strong understanding of cybersecurity principles and common attack vectors

Apply for this Position →

Get matched to jobs like this

Luna finds roles that fit your skills and career goals — no endless scrolling required.

Create a Free Profile