Night Shift Security Operations Center Analyst
Insight Global
Job Description
*Insight Global is hiring on behalf of one of our largest clients in the public service industry!*
*This position does require working the graveyard shift onsite in Orange, CA from 12am-9am and weekend work, working Saturday-Wednesday. Candidates must be local and comfortable with this requirement!*
Job Description:
Title: Tier 1 SOC Analyst (Night Shift)
Duration: 6-month contract with potential to extend/convert
Type: Fully Onsite, 5 days/week (Sat-Wed)
Location: Orange, CA
Hours: 12am-9am PST
Required Skills & Experience:
- Open to working midnight shift (12 AM – 9 AM), including weekends (Sat-Wed shift)
- 1+ year of relevant cybersecurity experience
- Experience with automation using PowerShell, Python, Power Automate, or PowerBI
- Experience with SIEM tools
- Familiarity with firewalls, web proxies, email gateways, EDR, and ServiceNow ticketing systems
- Experience with Microsoft Sentinel processing development and Standard Operating Procedure (SOP) creation/deployment
- Ability to identify process deficiencies and recommend improvements
- Strong interpersonal and communication skills
Nice to Have Skills & Experience:
- Bachelor's degree in Cybersecurity or related technical field
- Security+, GSEC, or equivalent industry certifications
- Experience with Power BI or similar reporting tools
- Exposure to cyber threat intelligence and metrics reporting
- Hands-on experience in a SOC environment
- Experience compiling incident reports and conducting log analysis
Job Description:
Insight Global is hiring a Tier 1 SOC Analyst who will be responsible for monitoring, alerting, responding to, and reporting cyber threats targeting critical assets and data. The analyst will work the graveyard shift and be responsible for triaging SIEM alerts, escalating incidents, and supporting automation initiatives.
The role involves daily turnover meetings with the day shift, working closely with senior site leads to investigate incidents, compile reports, and recommend SIEM tuning improvements. The analyst will also contribute to metrics reporting and cyber threat intelligence monitoring. This position requires strong foundational cybersecurity knowledge, scripting and automation capabilities, and the ability to work independently in a fast-paced environment.
Additional responsibilities include:
- Monitor and respond to ~90 active SIEM alerts
- Interacting with and escalate incidents to clients as needed
- Collaborate with shift leads to collect logs and build incident reports
- Conduct threat analysis and hypothesis development on what may have happened regarding an incident
- Submit findings to senior shift leads and SIEM engineering team
- Perform additional duties (~10% of time) including metrics reporting and cyber threat intelligence (Common threats include phishing, endpoint, and firewall-based incidents)
Compensation:
$23/hr to $28/hr.
Exact compensation may vary based on several factors, including skills, experience, and education.
Employees in this role will enjoy a comprehensive benefits package starting on day one of
employment, including options for medical, dental, and vision insurance. Eligibility to enroll in
the 401(k) retirement plan begins after 90 days of employment. Additionally, employees in this
role will have access to paid sick leave and other paid time off benefits as required under the
applicable law of the worksite location.