Join our team to monitor, detect, and respond to security incidents across the enterprise. The analyst will help protect mission-critical GPO systems by triaging alerts, correlating threat data, and supporting incident response activities.
This position is contingent upon contract award.
Location: Remote with periodic on-site meetings in Washington, DC
Clearance: Public Trust (or ability to obtain)
Responsibilities:
- Monitor SIEM dashboards and alerts (Microsoft Sentinel, Defender)
- Investigate incidents and recommend remediation actions
- Support log analysis and correlation from cloud and on-prem sources
- Produce documentation including incident reports, detection playbooks, SOPs
Qualifications:
- 3+ years of SOC experience in federal or enterprise settings
- Expertise with Microsoft Sentinel, Trellix, Stealthwatch, and NetWitness
- Strong understanding of threat detection and response frameworks
ASSYST is an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, disability, military status, national origin or any other characteristic protected under federal, state, or applicable local law