Information Security Analyst (SOC / Security Operations)
Nashville, TN (Hybrid – 2–3 days onsite)
Long-Term Contract Opportunity
We are seeking an Information Security Analyst to join a high-performing cybersecurity team supporting a large enterprise environment. This role serves as a critical “front line” function—monitoring, investigating, and responding to security events while ensuring risks are addressed quickly and effectively.
This is an excellent opportunity for a junior-to-mid level security professional to gain hands-on experience across SIEM, endpoint security, and enterprise security operations within a highly visible environment.
Key Responsibilities
-
Monitor and investigate alerts and indicators of compromise across multiple security platforms
-
Triage, escalate, and document security incidents in accordance with response procedures
-
Analyze logs and perform structured queries within SIEM tools to support investigations
-
Assist with vulnerability analysis and remediation tracking
-
Support reporting, documentation, and audit-related activities
-
Monitor security tool health and escalate system issues as needed
-
Collaborate with internal stakeholders on security-related requests and incident response
Required Qualifications
-
2+ year of experience in Information Security, Cybersecurity, or Security Operations
-
Hands-on experience with security technologies such as:
-
SIEM platforms (Splunk, QRadar, LogRhythm, or similar)
-
Endpoint detection and response (EDR)
-
Firewalls and intrusion detection/prevention systems
-
Malware protection and vulnerability scanning tools
-
Experience investigating and triaging security alerts
-
Understanding of network security concepts and protocols (TCP/IP, OSI model, DNS, HTTP, etc.)
-
Familiarity with Windows and Linux system logs
-
Ability to clearly document investigations and communicate findings
Strong analytical and troubleshooting skills
Preferred Qualifications
-
Associate's or Bachelor's degree in Computer Science, Information Security, MIS, or related field
-
Experience working in a SOC or security monitoring environment
-
Familiarity with:
-
Security incident response processes
-
Log analysis and threat detection techniques
-
Endpoint, network, cloud, and data security tools
-
Basic scripting knowledge (Python, Bash, or PowerShell)
-
Knowledge of compliance frameworks such as NIST, HIPAA, HITRUST, or PCI
-
Security certifications such as CompTIA Security+, SANS, or Cisco security certifications
Work Environment
-
Hybrid schedule (2–3 days onsite in downtown Nashville)
-
Long-term contract engagement (potential for extension or conversion based on performance)