Qureos

Find The RightJob.

**Must be a US Citizen**

**NOT Open to C2C/3rd Party Staffing Agencies, Please DO NOT email or contact me**


Our client is a globally recognized leader in advanced aerospace and defense technologies, supporting critical programs across commercial, government, and defense sectors. This organization is known for investing in cutting-edge cybersecurity initiatives, innovation, and operational excellence while providing employees the opportunity to work on impactful, large-scale enterprise environments.


Client Location: Farmington, CT

Jobsite Location: Hybrid – 3 days onsite / 1 day remote

Shift: 4x10 Schedule | Monday – Thursday | 12:00 PM – 10:30 PM

Job Title: SOC Monitoring Analyst

Type of Job: Contract

Project Length: 36 Months

Visa Requirement: US Citizen


We are seeking a SOC Monitoring Analyst to support enterprise-level cybersecurity monitoring and incident response operations within a fast-paced Security Operations Center environment. This role will focus on identifying, analyzing, and escalating potential security threats across a large-scale infrastructure while collaborating closely with cybersecurity and IT teams.


Key Responsibilities:

  • Monitor and investigate security alerts and suspicious activity across enterprise systems and networks
  • Analyze logs and event data from SIEM platforms, endpoints, servers, firewalls, proxies, and IDS/IPS solutions
  • Perform triage, incident handling, escalation, and response activities based on established security procedures
  • Support threat detection efforts and assist with troubleshooting security-related events and incidents
  • Collaborate with internal cybersecurity and infrastructure teams to improve monitoring and response capabilities
  • Maintain and follow operational procedures, documentation, and standard work processes
  • Work independently and within a team environment to manage multiple priorities in a high-volume setting


Technologies & Skills Sought:

  • SIEM platforms including Splunk and enterprise logging tools
  • Network monitoring and packet analysis tools such as Wireshark and tcpdump
  • Syslog, NetFlow, and security event log analysis
  • Endpoint security tools including Carbon Black, Symantec, McAfee, Forcepoint, and Tanium
  • Networking fundamentals including TCP/IP, topology, and network security concepts
  • Windows and UNIX/Linux operating systems
  • Incident response and security operations experience
  • Firewall, IDS/IPS, proxy, and endpoint alert analysis
  • Strong troubleshooting, analytical, and communication skills


Required:

  • Bachelors or Masters Degree in Cybersecurity
  • Equivalent hands-on experience or cybersecurity certifications will also be considered
  • Certification: Security+


If you’re open to learning more, please respond at your earliest convenience.

© 2026 Qureos. All rights reserved.