Logo for By Light Professional IT Services

Junior Cybersecurity Analyst

Key Facts

Remote From: 
Full time
Junior (1-2 years)
English

Other Skills

  • Non-Verbal Communication
  • Analytical Skills
  • Teamwork
  • Problem Solving

Roles & Responsibilities

  • Associate's degree or Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent experience)
  • 0-3 years of cybersecurity, SOC, NOC, cloud operations, service desk, or IT operations experience
  • Basic understanding of cybersecurity principles, networking fundamentals (TCP/IP), operating systems, cloud security concepts, and security monitoring operations
  • Familiarity with cybersecurity and monitoring tools such as Splunk, Security Onion, CrowdStrike, Nessus, ELK/Elasticsearch, Appgate, AWS CloudWatch, Microsoft Azure Monitor, or similar technologies

Requirements:

  • Monitor security events, alerts, dashboards, and operational queues within SIEM, IDS/IPS, and cloud security platforms
  • Respond to operational tickets, incidents, and service requests within established SLA response timelines; ensure ticket updates, escalations, documentation, and resolution activities comply with contractual SLA requirements
  • Assist with incident investigation, event enrichment, and evidence collection activities
  • Support ticket management, workflow tracking, and operational documentation within JIRA or equivalent ITSM platforms

Job description

Company Overview:

By Light Professional IT Services LLC readies warfighters and federal agencies with technology and systems engineered to connect, protect, and prepare individuals and teams for whatever comes next. Headquartered in McLean, VA, By Light supports defense, civilian, and commercial IT customers worldwide.

Position Overview:

The Junior Cybersecurity Analyst supports 24x7 cybersecurity monitoring, incident detection, alert triage, ticket response, escalation management, and operational reporting activities within a Network Operations Center (NOC) and Cybersecurity Operations Center (CSOC) environment. The analyst assists in monitoring enterprise, cloud, and tactical network environments, identifying potential security events, responding to operational tickets, supporting incident response activities, and maintaining operational awareness across connected and disconnected operational environments.


This role supports continuous monitoring operations utilizing SIEM, IDS/IPS, EDR/XDR, vulnerability management, cloud security, Zero Trust access, and ticketing platforms while operating within established operational procedures, escalation workflows, SLA requirements, and security playbooks.

Responsibilities:
  • Monitor security events, alerts, dashboards, and operational queues within SIEM, IDS/IPS, and cloud security platforms
  • Respond to operational tickets, incidents, and service requests within established SLA response timelines
  • Ensure ticket updates, escalations, documentation, and resolution activities comply with contractual SLA requirements
  • Perform initial triage and classification of cybersecurity and operational alerts
  • Escalate incidents in accordance with operational severity classifications and response procedures
  • Assist with incident investigation, event enrichment, and evidence collection activities
  • Support ticket management, workflow tracking, and operational documentation within JIRA or equivalent ITSM platforms
  • Monitor endpoint, network, cloud, and infrastructure telemetry for indicators of compromise or operational degradation
  • Support vulnerability management activities, including Nessus scan review and remediation tracking
  • Monitor and support security operations within AWS and Microsoft Azure cloud environments
  • Support Appgate Secure Access and Zero Trust access monitoring activities
  • Assist with Splunk dashboard monitoring, search analysis, correlation review, and alert validation
  • Support operational reporting, metrics collection, SLA tracking, and audit readiness activities
  • Maintain situational awareness across connected, degraded, and disconnected operational environments
  • Follow established cybersecurity procedures, change control processes, escalation paths, and operational playbooks
  • Participate in shift turnover briefings and operational status reporting
  • Support coordination activities between NOC, CSOC, engineering, cloud operations, and field support personnel
  • Maintain operational logs, incident records, and audit documentation

Work environment:

  • 24x7 operational monitoring environment
  • Shift-based operations, including nights, weekends, and holidays as required/if required
  • SLA-driven operational support environment
  • Hybrid operational support across enterprise, cloud, and tactical/disconnected environments
  • Collaboration with engineering, cybersecurity, cloud operations, field operations, and customer stakeholders
Required Experience/Qualifications:
  • Associate’s degree or Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent experience)
  • 0–3 years of cybersecurity, SOC, NOC, cloud operations, service desk, or IT operations experience
  • Basic understanding of:
    • cybersecurity principles
    • networking fundamentals
    • TCP/IP
    • operating systems
    • cloud security concepts
    • and security monitoring operations
  • Familiarity with cybersecurity and monitoring tools such as:
    • Splunk
    • Security Onion
    • CrowdStrike
    • Nessus
    • ELK/Elasticsearch
    • Appgate
    • AWS CloudWatch
    • Microsoft Azure Monitor
    • or similar technologies
  • Basic understanding of:
    • SIEM operations
    • incident response
    • log analysis
    • vulnerability management
    • cloud monitoring
    • ticket management
    • and threat detection concepts
  • Familiarity with AWS and Microsoft Azure environments
  • Experience responding to tickets and working within SLA-driven operational environments preferred
  • Ability to follow operational procedures and escalation workflows
  • Strong analytical and problem-solving skills
  • Effective written and verbal communication skills
  • Ability to work rotating shifts in a 24x7 operational environment
Preferred Experience/Qualifications:
  • Security+ certification (or ability to obtain within 6 months)
  • AWS Certified Cloud Practitioner (preferred)
  • Microsoft Azure Fundamentals (AZ-900) certification (preferred)
  • Familiarity with:
    • NIST frameworks
    • RMF
    • CMMC
    • Zero Trust architectures
    • or DoD cybersecurity environments
  • Experience with:
    • Splunk SIEM
    • AWS security services
    • Azure security services
    • Appgate SDP
    • or cloud-native monitoring platforms
  • Experience with ticketing systems such as JIRA or ServiceNow
  • Exposure to virtualization, endpoint security, or cloud-native security technologies
  • Active U.S. Government security clearance (preferred but not required)
Special Requirements/Security Clearance:
  • Ability to obtain and maintain a U.S. Government security clearance, if required by contract.

Cybersecurity Analyst Related jobs

Other jobs at By Light Professional IT Services

We help you get seen. Not ignored.

We help you get seen faster — by the right people.

🚀

Auto-Apply

We apply for you — automatically and instantly.

Save time, skip forms, and stay on top of every opportunity. Because you can't get seen if you're not in the race.

AI Match Feedback

Know your real match before you apply.

Get a detailed AI assessment of your profile against each job posting. Because getting seen starts with passing the filters.

Upgrade to Premium. Apply smarter and get noticed.

Upgrade to Premium

Join thousands of professionals who got noticed and hired faster.