SOC Analyst / Watch Officer
Occupations:
Information Security AnalystsSecurity Management SpecialistsSecurity ManagersSecurity GuardsIntelligence AnalystsIndustries:
Justice, Public Order, and Safety ActivitiesJewelry, Luggage, and Leather Goods RetailersInvestigation and Security ServicesComputer Systems Design and Related ServicesResidential Intellectual and Developmental Disability, Mental Health, and Substance Abuse FacilitiesCandidates MUST be U.S. citizens and have an active Secret Clearance.Job Title: SOC Analyst / Watch OfficerClient: IBM Federal / Department of Homeland SecurityLocation: Chandler, AZ (Onsite)Contract Term: 1 year+;Overview:Seeking an experienced SOC Watch Officer to support mission-critical cybersecurity operations for Client. This role serves as the on-shift tactical leader responsible for maintaining situational awareness, directing incident response, and protecting federal systems and critical infrastructure. Operating in a fast-paced 24/7 environment, the Watch Officer is the primary escalation point for security events, combining advanced analytical expertise with supervisory responsibilities. The position guides Tier 1 and Tier 2 analysts while coordinating with SOC leadership, incident response teams, and government stakeholders.Key Responsibilities:Lead real-time monitoring, detection, analysis, and response to cyber threats.Act as on-shift authority for incident escalation, containment, and remediation.Mentor analysts and ensure adherence to SOC processes, playbooks, and Client standards.Oversee shift operations, event tracking, and documentation for operational continuity.Conduct initial investigations and collaborate with Tier 3 engineers and threat intelligence teams.Deliver situation reports, incident summaries, and stakeholder updates.Provide leadership during high-severity incidents and crisis events.Ensure compliance with federal cybersecurity frameworks and reporting requirements.Recommend process improvements to strengthen detection and response capabilities.Required Qualifications:Active Secret clearance or ability to obtain one (required).Bachelor's degree in Cybersecurity, IT, or related field (or equivalent experience).5+ years in SOC, cyber defense, or incident response roles.Experience leading analysts or supervising 24/7 SOC operations.Strong knowledge of SIEM, EDR, network security, and threat analysis.Familiarity with NIST, FISMA, and MITRE Telecommunication&CK.Proven decision-making under pressure and excellent communication skills.