Job Details

Security Operations Center Lead

Company Apply Now

The JPI Group






Englewood, Colorado, United States


Contract, Engineering, Information Technology




*Must be a US Citizen or Green Card Holder*

Position Summary:

The focus of the Senior Cyber Security Threat Analyst is to distinguish, interrupt and suppress threat actors on enterprise networks. To execute this mission, the Threat Analyst will use data analysis, threat intelligence, and cutting-edge security technologies. Working within the Security Analysis and Operations Team, the Cyber Security Threat Analyst is responsible for detecting and assessing cyber security events and incidents across the enterprise environment. Threat Analysts will also participate in developing processes, procedures, training, etc. for new technologies. The candidate must have a curious investigative mind, an interest in information security, and the ability to communicate complex ideas to varied audiences.

Job  Duties and Responsibilities:

  • Examine alerts from various security monitoring tools, perform triage & determine scope of threats; escalate as necessary.
  • Develop and analyze dashboards and reports to identify potential threats, suspicious/anomalous activity, malware, etc
  • Coordinate with End user computing groups that are exhibiting unusual behavior (i.e. excessive firewall denials, Okta logins from unusual geo-locations) to have them assist in troubleshooting/remedying the issues.
  • Assist with ServiceNow tickets relating to whitelisting & user internet access by researching the domains being requested for security/reputation, liaising with users for additional details, and passing the tickets along for implementation in the proxies; will soon be getting additional training from IT Security staff to do the implementations myself.
  • Manage various Proof-of-Concept implementations for threat hunting platforms/tools to evaluate if they would be beneficial for the organization by providing additional visibility into the enterprise environment and increasing incident response time.
  • Provide Tier 2 & Tier 3 support as needed
  • Keep up-to-date with information security news, techniques, and trends
  • Become proficient with Ticketing system and workflow management
  • Become proficient with third-party threat intelligence tools as required


  • 3+ years’ experience in Information Security (Required)
  • Experience with traditional security tools found in enterprise network environments: (Required)
    • Anti-Virus
    • IPS/IDS
    • Firewalls
    • Proxies
    • Active Directory
    • Vulnerability assessment tools
  • Cyber Threat Hunting Experience (Required)
  • Strong communication skills written and oral (Required)
  • Experience with data analysis (Required)
  • Experience writing and communicating with customers (Desired)
  • Experience with SIEM (Required)
  • Experience with EDR (Desired)
  • Experience with cyber threat intelligence (Required)
  • Experience with software vulnerabilities & exploitation (Required)
  • Prior experience working with in the following areas: (Desired)
    • Computer Incident Response Team (CIRT)
    • Computer Security Incident Response Center (CSIRC)
    • Security Operations Center (SOC)
  • Experience with malware analysis (Desired)
  • Experience with APT/crimeware ecosystems (Desired)
  • Degree in Information Security or Information Technology (Desired)
  • The following certifications are strongly desired:
    • Security+
    • GIAC Certified Incident Handler (GCIH)
    • GIAC Certified Intrusion Analyst (GCIA)
    • SANS Institute/GIAC
    • ISC2