$60K - 90K a year
Monitor and analyze security incidents, collaborate with incident response teams, manage tool access, and document vulnerabilities to enhance cybersecurity posture.
0-3 years SOC or cybersecurity experience, proficiency with Splunk, Tenable, Tanium, ServiceNow, strong analytical and communication skills, and familiarity with vulnerability management and incident response.
Description: About Zen: Own your opportunity to work with a client-focused growing agile small business. Make an impact by advancing our government organizations charged with keeping our country safe, prosperous, and secure. Zen Strategics LLC is a cleared, niche consulting firm, offering innovative Cybersecurity, Cloud/DevSecOps, Information Data Management and Modernization solutions. We are a leading organization committed to delivering innovative solutions and ensuring the highest standards of security for our customers' infrastructure assets. We are dedicated to staying ahead of evolving cyber threats and protecting our clients' data leveraging cutting-edge technologies (to include AI/ML) and proactive security measures. Position Description: We are seeking a detail-oriented and proactive Security Operations Center (SOC) Analyst to join our team. The Junior SOC Analyst will play a critical role in monitoring, analyzing, and responding to security incidents. This position involves collaboration with Incident Response teams, conducting research, managing tool access, and leveraging industry-leading security tools to protect and enhance the organization's cybersecurity posture. Requirements: Key Responsibilities: • Monitor and manage SOC Team Inbox alerts, ensuring effective communication with the SOC Incident Response Team for tracking and reporting purposes. • Collaborate with SOC Incident Response Team members to analyze, compile, and submit daily IP blocklists for peer review and remediation. • Conduct in-depth research and analysis of Splunk Enterprise Security (ES) notables, identifying tuning opportunities or escalation needs in coordination with Senior SOC Incident Response Analysts. • Design and implement a new Tool Access Manager in collaboration with the SOC Incident Response Team Lead, ensuring accurate tracking of software status and employee access. • Analyze and document critical vulnerabilities identified in Tenable plugins across unique hosts, providing detailed reports to the Information System Security Officer (ISSO) as required. • Compile and upload daily IP addresses from the blocklist to Splunk Cloud's Block List Lookups, enabling effective tracking of IP blocklist traffic. • Execute OCIO Vulnerability Management Notification and Response procedures, including generating RSA Archer tickets based on Tenable scan results for plugins. • Conduct research and analysis of Mandiant MD5 hashes within the Tanium console to detect potential malicious activity, communicating findings to Senior Incident Response Analysts. • Proactively monitor internal DNS traffic, identifying and escalating potential signs of malicious activity to Senior Analysts for further investigation QUALIFICATIONS: Years of experience: 0 -3 years Education: B.S. Information Science or related degree OTHER: • Proven experience in a SOC or similar cybersecurity role. • Proficiency in Splunk, Tenable, Tanium, and Service Now. • Strong analytical and problem-solving skills with the ability to interpret and act on security data. • Effective communication and collaboration skills to work with diverse teams. • Familiarity with vulnerability management and incident response processes. • Ability to conduct in-depth research and provide thorough documentation Salary at Zen Strategics is determined by various factors, including but not limited to location, the individual’s particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. Equal Opportunity Employer/Veterans/Disabled
This job posting was last updated on 9/25/2025