Find your dream job faster with JobLogr
AI-powered job search, resume help, and more.
Try for Free
NeoSystems LLC

NeoSystems LLC

via Indeed

Apply Now
All our jobs are verified from trusted employers and sources. We connect to legitimate platforms only.

Cybersecurity Operations Analyst I

Anywhere
full-time
Posted 9/29/2025
Verified Source
Key Skills:
Microsoft 365 Defender suite
Security+ certification
Incident response
Microsoft Sentinel
CMMC 2.0 compliance
Vulnerability and patch management
Windows event logs
Microsoft 365 audit logs

Compensation

Salary Range

$50K - 70K a year

Responsibilities

Monitor and triage security alerts in Microsoft 365 environments, assist incident response, manage ticketing, maintain platform health, and support vulnerability management.

Requirements

1-2 years IT or cybersecurity experience, familiarity with Microsoft 365 security tools, Security+ or SC-900 certification, U.S. citizenship, and ability to travel.

Full Description

Summary: The Cybersecurity Operations Analyst I (COA 1) is responsible for the initial triage and monitoring of security events, working exclusively in Microsoft 365 E5 environments, and helping to enforce CMMC 2.0 requirements. COA 1 will work alongside senior analysts and engineers to identify suspicious activity, validate alerts, and support incident response workflows. Role and Responsibilities: Monitoring and triage • Monitor alerts and notifications from Microsoft 365 Defender suite: • * Defender for Endpoint • Defender for Office 365 • Defender for Cloud Apps (MCAS) • Defender for Identity (formerly ATA) • Microsoft Defender XDR • Monitor for alerts from other alerting sources (such as external or outsourced Security Operations Center). • Perform initial triage of security alerts, determine false positives, and escalate true positives based on playbook criteria. • Review and classify incidents in Microsoft Sentinel or third-party SIEM tools according to severity and SLA guidelines. • Manage security operations tasks and assignments in ticketing system. Incident handling and response support • Assist senior analysts during active incidents by collecting logs, screenshots, and device/user activity history. • Document timelines, observations, and artifacts to support root cause analysis and reporting. • Conduct follow-up on low-risk alerts and phishing investigations (possibly with supervised guidance). Customer interaction and ticket management • Document findings and updates in the SOC ticketing system with accuracy and clarity. • Respond to basic client inquiries related to user behavior, alert definitions, or mitigation steps under supervision. • Follow documented workflows to support CMMC 2.0 incident response requirements, including reporting timelines and evidence handling. Platform maintenance and log health • Review and report on log ingestion health from Defender, Entra ID, and endpoint agents across customer tenants as required. • Assist in onboarding new clients to SOC monitoring tools and validating telemetry and log collection flows. • Identify noisy or misconfigured alert rules and report recommendations to senior analysts. • Assist in gathering and assembling audit evidence to support compliance assessments. Vulnerability and patch management • Manage operating system and third-party software patching cycles for customer environments. • Prioritize and manage vulnerability remediation in coordination with infrastructure teams and customer needs. • Leverage Microsoft Defender Vulnerability Management (MDVM) and MDE APIs for continuous hygiene improvement. Qualifications: • 1–2 years of experience in IT support, help desk, cybersecurity, or SOC environment (or relevant degree with internship/entry-level experience). • Familiarity with Windows event logs, Microsoft 365 audit logs, and endpoint activity. • Basic understanding of cybersecurity concepts, attack vectors, and threat modeling. • Comfortable with Microsoft 365 environments and cloud-native tooling. • Strong written communication skills for documentation and customer updates. • Security+ or SC-900 certification • Must be a U.S. citizen eligible for ITAR-compliant work. Preferred Skills: • Exposure to Microsoft Defender XDR • Microsoft SC-100 or SC-200 certification • Understanding of CMMC and NIST 800-171 requirements • Knowledge of the MITRE ATT&CK framework Additional Notes • Ability to travel EOE M/F/D/V Equal Opportunity Employer This employer is required to notify all applicants of their rights pursuant to federal employment laws. For further information, please review the Know Your Rights notice from the Department of Labor.

This job posting was last updated on 9/30/2025

Ready to have AI work for you in your job search?

Sign-up for free and start using JobLogr today!

Get Started »
JobLogr badgeTinyLaunch BadgeJobLogr - AI Job Search Tools to Land Your Next Job Faster than Ever | Product Hunt