"Alerted.org

Job Title, Industry, Employer
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Advanced Search

Advanced Search

Cancel
Remove
+ Add search criteria
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Related to

  • SIEM Analyst

    IMRI (Washington, DC)



    Apply Now

    SIEM Analyst

     

    Back to search

     

    Posted: 7/17/2025

     

    Location Name: Washington, DC

     

    Wage Max: 110,000.00 Annual

     

    Wage Min: 85,000.00 Annual

     

    Position Type: Full-Time

    COMPANY OVERVIEW

    Join our award-winning team at Information Management Resources, Inc. (IMRI), a small business leader in the technology industry known for our commitment to innovation, excellence, and authenticity. Founded in 1992, IMRI has been at the forefront of delivering advanced cybersecurity and IT solutions, safeguarding organizations against evolving threats. We have built a reputation for our expertise in Cybersecurity, Digital Transformation, Strategic Business Consulting, and Staff Augmentation. Guided by our core values of innovation, excellence, and a solution-driven mindset, we have served a diverse portfolio of customers that includes federal agencies, state and local governments, and Fortune 1000 companies.

     

    At IMRI, we recognize the integral part our employees play in our ongoing success. To support this, we offer a comprehensive benefits package, tailored to meet the individual needs of our employees. We are committed to promoting their overall well-being and equipping them with the necessary tools to flourish in their careers. We welcome you to be a part of our ongoing mission as we continue to navigate the digital landscape, committed to empowering organizations with our innovative solutions.

    POSITION SUMMARY:

    We are seeking a highly skilled and experienced SIEM Analyst to join our team. The ideal candidate will have a minimum of five years of overall IT or cybersecurity experience, including at least three years of working knowledge in Government Community Cloud High (GCC-H)/GCC environments. This role involves managing and optimizing Security Information and Event Management (SIEM) systems, with a focus on Microsoft Sentinel, log management, threat intelligence, and incident handling. The SIEM Analyst will play a critical role in ensuring the security and efficiency of our clients' environments through proactive monitoring, analysis, and continuous improvement.

    ROLE AND RESPONSIBILITIES:

    + Log Management:

    + Reviewing the ingestion and normalization of logs to ensure accuracy and completeness.

    + Ingesting and analyzing all common log formats.

    + Consulting on log storage methods, pricing tiers, and cost management recommendations.

    + Microsoft Sentinel Management:

    + Managing Microsoft Sentinel with regularly updated baselines.

    + Continuously deploying updated rules to enhance security monitoring.

    + Threat Intelligence:

    + Disbursing threat intelligence to key employees.

    + Sharing hardening recommendations and updating baselines based on lessons learned across the client base.

    + Staff Support:

    + Providing educational development by leveraging Microsoft partnerships and team expertise to conduct workshops and training on Azure and M365 Cloud Services.

    + Continuous Improvement:

    + Reviewing architecture to identify gaps in cybersecurity solutions.

    + Driving efficiencies in logging and log storage processes.

    + Program Management Support:

    + Participating in recurring operational touchpoints.

    + Conducting quarterly executive management reviews to provide updates and insights.

    + Automated Response:

    + Utilizing expert systems to enhance security investigations by integrating and analyzing external and internal data sources.

    + Automating investigation workflows to reduce manual effort and accelerate incident response times.

    + 24x7x365 Monitoring of Security Events:

    + Providing advanced endpoint detection and response (EDR) threat detection and response services for desktops, servers, and firewalls.

    + Monitoring and managing security alarms for firewalls, network devices, and Active Directory user behavior.

    + Monitoring Microsoft Sentinel instances and analyzing syslog and Common Event Format (CEF) data.

    + Developing custom alerting capabilities based on business requirements.

    + Incident Handling Support:

    + Supporting incident management for the Security Operations Center (SOC).

    + Conducting recurring operational reviews with the designated SOC Lead.

    + Providing recommended best practices for responding to security events.

    REQUIRED QUALIFICATIONS:

    + Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Equivalent work experience may be considered in lieu of a degree.

    + Minimum of five (5) years of overall IT or cybersecurity experience.

    + At least three (3) years of hands-on experience in Government Community Cloud High (GCC-H)/GCC environments.

    + Knowledge, skills, and abilities to operate, maintain, and upgrade two or more of the following tools: Microsoft Sentinel, Microsoft Azure, Microsoft DfE, Xacta 360/IO, Zscaler, FedRamp, Cloudflare, NetWitness, Tenable IO, Nexpose, Armis, Trellix HX/CM, and ServiceNow.

    + Strong analytical, problem-solving, and communication skills.

    + Ability to pass a Public Trust background check prior to onboarding.

     

    IMRI offers top-tier benefits that include: medical coverage through nationally recognized carriers, ancillary coverages, paid vacation and sick leave in compliance with all state and local laws, 401(k) with company match, company paid life insurance and LTD, and several additional voluntary coverages.

     

    Pay will be commensurate with the experience, skills, and qualifications that the candidate brings to the position.

    EQUAL EMPLOYMENT OPPORTUNITY

    EEO/Affirmative Action Statement and Non-Discrimination Policy IMRI is an Equal Employment Opportunity employer committed to maintaining a non-discriminatory, diverse work environment. In accordance with Title VII of the Civil Rights Act of 1964, Section 503 of the Rehabilitation Act of 1973, Vietnam Era Veteran's Readjustment Assistance Act of 1974 (VEVRAA), Americans with Disabilities) (ADA), and other federal, state, and local anti-discrimination laws, IMRI does not unlawfully discriminate against any person on the basis of race, color, religion, sex, national origin, ancestry, genetic information, age, marital status, sexual orientation, physical or mental disability, or status as a special disabled veteran or other veteran. IMRI will take affirmative action to assure equal opportunity for employment is provided with regard to all personnel actions. This is including but not limited to: recruitment, selection, compensation, benefits, training, promotion, demotion, layoff, termination and all other terms and conditions of employment.

     


    Apply Now



Recent Searches

[X] Clear History

Recent Jobs

  • SIEM Analyst
    IMRI (Washington, DC)
  • Software Engineer (Systems)
    Meta (Menlo Park, CA)
[X] Clear History

Account Login

Cancel
 
Forgot your password?

Not a member? Sign up

Sign Up

Cancel
 

Already have an account? Log in
Forgot your password?

Forgot your password?

Cancel
 
Enter the email associated with your account.

Already have an account? Sign in
Not a member? Sign up

© 2025 Alerted.org