Accenturefederalservices
Network Security Monitoring Analyst
Company
Role
Network Security Monitoring Analyst
Location
Job type
-
Posted
12 hours ago
Salary
Job description
The work
The Network Security Monitoring Analyst is a vital member of the Security Operations Center (SOC), serving as the first line of defense against cyber threats. This role involves continuous monitoring of security systems, analyzing alerts, identifying potential incidents, and responding swiftly to mitigate risks. Analysts leverage a variety of security tools, threat intelligence, and established procedures to maintain a strong security posture. This role requires a blend of technical expertise, analytical thinking, strong communication skills, and a commitment to continuous learning.
Key responsibilities:
- Actively monitor SIEM, IDS/IPS, EDR, firewalls, and other security systems for suspicious activity
- Triage and analyze security alerts, identifying true threats vs. false positives
- Support incident response activities including triage, containment, eradication, and recovery
- Analyze security logs and correlate events across multiple sources
- Integrate threat intelligence into monitoring workflows and incident investigations
- Document incident details, timelines, and actions taken
- Assist in tuning, configuring, and maintaining security tools
- Support compliance initiatives aligned to NIST, FISMA, and internal policies
- Collaborate with SOC team members, incident responders, and IT operations
- Maintain awareness of emerging cyber threats, vulnerabilities, and security practices
Here’s what you need:
- Bachelor’s degree in computer science, information technology, cybersecurity, or equivalent experience
- Proven experience working in a SOC or similar cybersecurity environment
- Strong understanding of networking concepts and protocols (TCP/IP, DNS, HTTP, etc.)
- Proficiency using SIEM tools, especially Splunk
- Familiarity with IDS/IPS, EDR, and other security platforms (Snort, Suricata, CrowdStrike, SentinelOne)
- Basic to intermediate scripting skills (Python, Bash) for automation and analysis
- Strong analytical and problem‑solving skills
- Excellent communication and teamwork abilities
- Ability to operate in a fast‑paced 24/7 SOC environment
- Knowledge of common operating systems (Windows, Linux, macOS)
- Understanding of cloud security concepts
Nice to have:
- Relevant cybersecurity certifications (Security+, CySA+, CEH, GCIA, etc.)
- Experience with log correlation, threat hunting, or SOC automation
- Familiarity with MITRE ATT&CK or other threat‑behavior frameworks
- Experience tuning SIEM rules, dashboards, and detection logic
- Exposure to digital forensics or malware analysis
Eligibility requirements:
- Must be able to obtain and maintain a Public Trust government clearance
- Ability to work shift schedules as part of a 24/7 SOC operation
As required by local law, Accenture Federal Services provides reasonable ranges of compensation for hired roles based on labor costs in the states of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland. The base pay range for this position in these locations is shown below. Compensation for roles at Accenture Federal Services varies depending on a wide array of factors, including but not limited to office location, role, skill set, and level of experience. Accenture Federal Services offers a wide variety of benefits. You can find more information on benefits here. We accept applications on an on-going basis and there is no fixed deadline to apply.
Explore more
Similar jobs
Information Systems Security Officer (ISSO)
Veterans
Information Systems Security Officer Mid (Strong Internal) 2026-1462 (Remote)
Managed Care Advisors
Information Security Analyst
Fis
Information Security Analyst
Allens
Information Systems Security Officer
Leidos
Health Information Security Analyst I
cherokeenation