Use left and right arrow keys to navigate
Hours Full-time, Part-time
Location Bloomington, MN
Bloomington, Minnesota

About this job

span style="font-size:12pt;"span style="font-family:Aptos, sans-serif;"buspan style="font-size:11pt;"span style="color:#000000;"Position Overview/span/span/u/b/span/spanbrspan style="font-size:12pt;"span style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"span style="color:#000000;"We are seeking a motivated and detail-oriented bLevel 1 Security Analyst/b#160;to join our Cybersecurity Team on a 6-month contract. The ideal candidate will have prior experience in a SOC or similar threat monitoring environment, a strong desire to learn, and the ability to work collaboratively within a team. This role involves triaging security alerts, investigating incidents, and supporting threat detection and response efforts./span/span/span/spanbrspan style="font-size:12pt;"span style="font-family:Aptos, sans-serif;"buspan style="font-size:11pt;"span style="color:#000000;"Desired Qualifications/span/span/u/b/span/spanullispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Prior experience in a SOC or similar security operations role./span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Strong desire to learn and grow in the cybersecurity field./span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Ability to follow direction and work effectively in a team environment./span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Excellent communication and documentation skills./span/span/span/span/span/li/ulspan style="font-size:12pt;"span style="font-family:Aptos, sans-serif;"buspan style="font-size:11pt;"span style="color:#000000;"Key Responsibilities/span/span/u/b/span/spanullispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Monitor and triage security alerts from various sources including SIEM, EDR, IDS/IPS, and threat intelligence platforms./span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Perform initial investigation and classification of security events./span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Escalate incidents based on severity and impact, following established playbooks and procedures./span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Collaborate with senior analysts and other IT teams to support incident response activities./span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Document findings, actions taken, and recommendations in case management/ticketing systems (e.g., SIEM, ServiceNow)./span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Perform threat hunting and enrichment activities using MITRE ATTamp;CK and other frameworks./span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Continuously improve detection and response capabilities through feedback and learning./span/span/span/span/span/li/ulspan style="font-size:12pt;"span style="font-family:Aptos, sans-serif;"buspan style="font-size:11pt;"span style="color:#000000;"Technical Skills amp; Tooling/span/span/u/b/span/spanbrspan style="font-size:12pt;"span style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"span style="color:#000000;"Proficiency or hands-on experience with the following tools and concepts is required:/span/span/span/spanullispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"bspan style="font-size:11pt;"SIEM Platforms:/span/bspan style="font-size:11pt;"#160;Splunk, QRadar, Sentinel, CrowdStrike/span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"bspan style="font-size:11pt;"IDS/IPS:/span/bspan style="font-size:11pt;"#160;Snort, Next-Generation Firewalls (NGFW)/span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"bspan style="font-size:11pt;"EDR Solutions:/span/bspan style="font-size:11pt;"#160;CrowdStrike, SentinelOne, Carbon Black/span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"bspan style="font-size:11pt;"Ticketing Systems:/span/bspan style="font-size:11pt;"#160;ServiceNow, SIEM cast management/span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"bspan style="font-size:11pt;"Security Domains:/span/b /span/span/span/spanul style="list-style-type:circle;"lispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Network Security Monitoring/span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Basic Malware Analysis/span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Threat Intelligence Enrichment/span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"MITRE ATTamp;CK Framework/span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Incident Investigation amp; Triage/span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Threat Hunting/span/span/span/span/span/li/ul/li/ulspan style="font-size:12pt;"span style="font-family:Aptos, sans-serif;"buspan style="font-size:11pt;"span style="color:#000000;"Core Role Keywords/span/span/u/b/span/spanullispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"SOC Analyst/span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Security Analyst Level 1, 2/span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Security Operations/span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Threat Monitoring/span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Security Event Analyst/span/span/span/span/span/lilispan style="font-size:12pt;"span style="color:#000000;"spanspan style="font-family:Aptos, sans-serif;"span style="font-size:11pt;"Cyber Defense Analyst/span/span/span/span/span/li/ul

Nearby locations

Posting ID: 1166553890 Posted: 2025-09-25 Job Title: Level Security Analyst