Information Security Analyst (SOC / Security Operations)
Nashville, TN (Hybrid – 2–3 days onsite)
Long-Term Contract Opportunity
We are seeking an Information Security Analyst to join a high-performing cybersecurity team supporting a large enterprise environment. This role serves as a critical “front line” function—monitoring, investigating, and responding to security events while ensuring risks are addressed quickly and effectively.
This is an excellent opportunity for a junior-to-mid level security professional to gain hands-on experience across SIEM, endpoint security, and enterprise security operations within a highly visible environment.
Key Responsibilities
- Monitor and investigate alerts and indicators of compromise across multiple security platforms
- Triage, escalate, and document security incidents in accordance with response procedures
- Analyze logs and perform structured queries within SIEM tools to support investigations
- Assist with vulnerability analysis and remediation tracking
- Support reporting, documentation, and audit-related activities
- Monitor security tool health and escalate system issues as needed
- Collaborate with internal stakeholders on security-related requests and incident response
Required Qualifications
- 2+ year of experience in Information Security, Cybersecurity, or Security Operations
- Hands-on experience with security technologies such as:
- SIEM platforms (Splunk, QRadar, LogRhythm, or similar)
- Endpoint detection and response (EDR)
- Firewalls and intrusion detection/prevention systems
- Malware protection and vulnerability scanning tools
- Experience investigating and triaging security alerts
- Understanding of network security concepts and protocols (TCP/IP, OSI model, DNS, HTTP, etc.)
- Familiarity with Windows and Linux system logs
- Ability to clearly document investigations and communicate findings
Strong analytical and troubleshooting skills
Preferred Qualifications
- Associate's or Bachelor's degree in Computer Science, Information Security, MIS, or related field
- Experience working in a SOC or security monitoring environment
- Familiarity with:
- Security incident response processes
- Log analysis and threat detection techniques
- Endpoint, network, cloud, and data security tools
- Basic scripting knowledge (Python, Bash, or PowerShell)
- Knowledge of compliance frameworks such as NIST, HIPAA, HITRUST, or PCI
- Security certifications such as CompTIA Security+, SANS, or Cisco security certifications
Work Environment
- Hybrid schedule (2–3 days onsite in downtown Nashville)
- Long-term contract engagement (potential for extension or conversion based on performance)