Cloud SOC Analyst
BridgePhase
- San Antonio, TX
- Permanent
- Full-time
- Monitor, triage, and analyze security alerts and logs across mission systems to identify anomalous or malicious activity.
- Support incident response activities by conducting initial investigations and escalating issues as needed.
- Lead investigations into high-priority security incidents, including malware analysis and reverse engineering to determine intent and impact, and provide root cause analysis and remediation guidance to system teams.
- Leverage SIEM platforms and threat intelligence feeds to identify patterns, indicators of compromise (IOCs), and trends.
- Perform vulnerability scans, assist with patch tracking, and maintain POA&M documentation.
- Collaborate with cyber engineers to implement and refine monitoring, alerting, and defensive toolsets.
- Analyze system and network activity for indicators of security policy violations or threats.
- Assist in maintaining and updating system security documentation in alignment with RMF and NIST SP 800-53 standards.
- Participate in readiness assessments, compliance checks, and audit preparation activities.
- Contribute to briefings and reports that communicate risks, vulnerabilities, and mitigation strategies to mission stakeholders.
- 3–5 years of experience in cybersecurity analysis or security operations, including defending AWS-hosted environments and Internet-facing web services.
- Hands-on experience with SIEM platforms, log analysis, and basic incident response techniques.
- Experience developing detection content such as alerts, dashboards, and correlation rules to support threat monitoring.
- Familiarity with malware analysis and reverse engineering techniques to determine impact and intent.
- Linux experience is required, including familiarity with command-line tools and system internals.
- Ability to produce root cause analysis reports and remediation guidance following security incidents.
- Understanding of common cybersecurity frameworks such as RMF, NIST SP 800-53, and DISA STIGs.
- Working knowledge of networking protocols, system logs, and host/network forensics.
- Familiarity with tools such as Splunk, Kibana, Elastic, Suricata, OSQuery, or similar.
- Exposure to threat intelligence platforms, vulnerability management, or EDR solutions.
- Strong written and verbal communication skills with attention to detail.
- Active Secret clearance is required; TS/SCI preferred.
- Security+ or equivalent DoD 8570-compliant certification preferred.
- B.S. in Cybersecurity, Information Technology, or equivalent experience.
At BridgePhase, our values shape our culture and guide our actions. We act with integrity, honesty, and respect, earning trust and fostering collective success. We are critical thinkers and problem solvers, driving innovation and positive disruption to solve hard challenges at speed and scale. Our work is characterized by courage, compassion, commitment, and teamwork. We apply disciplined engineering principles and a proven agile approach that deliver flexible, simplified, durable and performant solutions that drive continuous improvement and have lasting impact and sustained value. Additionally, we invest in our communities through strategic charitable initiatives, empowering our employees to make meaningful contributions to causes they are passionate about.Our Benefits:
We pride ourselves on providing top-tier benefits that rival those found in larger organizations. Below are some of the perks our team enjoys:
- Competitive compensation based on experience
- Flexible PTO plan
- Paid Sick Leave
- 100% Paid Paternal Leave (16 weeks Maternity, 6 weeks Paternity)
- 401k plan with 6% employer matching (zero vesting period)
- Excellent health, dental, and vision benefits
- Professional development budget that can be used for certifications and training
- Paid community service days