SOC Analyst
**Must be a US Citizen** **NOT Open to C2C/3rd Party Staffing Agencies, Please DO NOT email or contact me**Our client is a globally recognized leader in advanced aerospace and defense technologies, supporting critical programs across commercial, government, and defense sectors. This organization is known for investing in cutting-edge cybersecurity initiatives, innovation, and operational excellence while providing employees the opportunity to work on impactful, large-scale enterprise environments.Client Location: Farmington, CTJobsite Location: Hybrid – 3 days onsite / 1 day remoteShift: 4x10 Schedule | Monday – Thursday | 12:00 PM – 10:30 PMJob Title: SOC Monitoring AnalystType of Job: ContractProject Length: 36 MonthsVisa Requirement: US CitizenWe are seeking a SOC Monitoring Analyst to support enterprise-level cybersecurity monitoring and incident response operations within a fast-paced Security Operations Center environment. This role will focus on identifying, analyzing, and escalating potential security threats across a large-scale infrastructure while collaborating closely with cybersecurity and IT teams.Key Responsibilities:Monitor and investigate security alerts and suspicious activity across enterprise systems and networksAnalyze logs and event data from SIEM platforms, endpoints, servers, firewalls, proxies, and IDS/IPS solutionsPerform triage, incident handling, escalation, and response activities based on established security proceduresSupport threat detection efforts and assist with troubleshooting security-related events and incidentsCollaborate with internal cybersecurity and infrastructure teams to improve monitoring and response capabilitiesMaintain and follow operational procedures, documentation, and standard work processesWork independently and within a team environment to manage multiple priorities in a high-volume settingTechnologies & Skills Sought:SIEM platforms including Splunk and enterprise logging toolsNetwork monitoring and packet analysis tools such as Wireshark and tcpdumpSyslog, NetFlow, and security event log analysisEndpoint security tools including Carbon Black, Symantec, McAfee, Forcepoint, and TaniumNetworking fundamentals including TCP/IP, topology, and network security conceptsWindows and UNIX/Linux operating systemsIncident response and security operations experienceFirewall, IDS/IPS, proxy, and endpoint alert analysisStrong troubleshooting, analytical, and communication skillsRequired:Bachelors or Masters Degree in CybersecurityEquivalent hands-on experience or cybersecurity certifications will also be consideredCertification: Security+If you’re open to learning more, please respond at your earliest convenience.