
Security Operations Specialist (Topeka)
Insight Global, Topeka, KS, United States
Job title:
SOC Analyst
Duration:
12-month contract to hire
Location-zipcode & Travel:
Onsite 5 days a week in Topeka
Schedule:
Multiple shifts * Need to be flexible in being assigned to one of the shifts below*
Shift(s):
· Evenings: Monday – Friday 3:00 pm – 12:00 am
· Night Shift: Monday – Friday 11:00 pm – 8:00 am
· Saturday/Sunday: Two 12-hour shifts (7:00 am - 8:00 pm) + two 8-hour shifts Monday – Friday 3:00 pm – 12:00 am
· Saturday/Sunday: wo 12-hour shifts (7:00 pm - 8:00 am) + two 8-hour shifts Monday – Friday 11:00 pm – 8:00 am
There is a mandatory training period for a minimum of 12 weeks on first shift, from 7:00 AM to 4:00 PM.
PR:
$30-33.65/hour - depends on experience.
Must haves:
1+ years experience in network security, cybersecurity, systems administration, or identity management
Understanding of incident response procedures and documentation
Excellent verbal and written communication skills with strong attention to detail
Plusses:
Threat intelligence analyzation
Security tool experience (such as Rapid7, SentinalOne, etc)
Firewall and VPN configuration experience
Regulatory compliance knowledge (HIPPA, CJIS, NIST)
Security or networking certifications
Day to day:
A Security Operations Center (SOC) Analyst is responsible for continuously monitoring security events using tools such as SIEM, IDS/IPS, firewall logs, and endpoint protection platforms to identify potential threats. The role involves investigating and responding to alerts, anomalies, and suspected incidents in accordance with established incident response protocols. SOC Analysts analyze host logs, network traffic, and system activity to detect, contain, and remediate security threats. They gather and evaluate threat intelligence to support proactive defense strategies and improve overall security posture. The position requires documenting incidents thoroughly, including actions taken, findings, and lessons learned, while contributing to internal knowledge repositories. SOC Analysts complete regular security checklists, system assessments, and compliance verifications to ensure controls are operating effectively. They follow up on non-compliant items and coordinate corrective actions as needed to mitigate risk. The role also includes monitoring and maintaining endpoint security tools such as antivirus and EDR solutions, ensuring proper deployment and functionality across the environment. SOC Analysts stay current on emerging cybersecurity trends and share insights with the team to drive continuous improvement. They contribute to SOC policies, standard operating procedures, incident response playbooks, and maintain auditable records in alignment with organizational and regulatory standards.
SOC Analyst
Duration:
12-month contract to hire
Location-zipcode & Travel:
Onsite 5 days a week in Topeka
Schedule:
Multiple shifts * Need to be flexible in being assigned to one of the shifts below*
Shift(s):
· Evenings: Monday – Friday 3:00 pm – 12:00 am
· Night Shift: Monday – Friday 11:00 pm – 8:00 am
· Saturday/Sunday: Two 12-hour shifts (7:00 am - 8:00 pm) + two 8-hour shifts Monday – Friday 3:00 pm – 12:00 am
· Saturday/Sunday: wo 12-hour shifts (7:00 pm - 8:00 am) + two 8-hour shifts Monday – Friday 11:00 pm – 8:00 am
There is a mandatory training period for a minimum of 12 weeks on first shift, from 7:00 AM to 4:00 PM.
PR:
$30-33.65/hour - depends on experience.
Must haves:
1+ years experience in network security, cybersecurity, systems administration, or identity management
Understanding of incident response procedures and documentation
Excellent verbal and written communication skills with strong attention to detail
Plusses:
Threat intelligence analyzation
Security tool experience (such as Rapid7, SentinalOne, etc)
Firewall and VPN configuration experience
Regulatory compliance knowledge (HIPPA, CJIS, NIST)
Security or networking certifications
Day to day:
A Security Operations Center (SOC) Analyst is responsible for continuously monitoring security events using tools such as SIEM, IDS/IPS, firewall logs, and endpoint protection platforms to identify potential threats. The role involves investigating and responding to alerts, anomalies, and suspected incidents in accordance with established incident response protocols. SOC Analysts analyze host logs, network traffic, and system activity to detect, contain, and remediate security threats. They gather and evaluate threat intelligence to support proactive defense strategies and improve overall security posture. The position requires documenting incidents thoroughly, including actions taken, findings, and lessons learned, while contributing to internal knowledge repositories. SOC Analysts complete regular security checklists, system assessments, and compliance verifications to ensure controls are operating effectively. They follow up on non-compliant items and coordinate corrective actions as needed to mitigate risk. The role also includes monitoring and maintaining endpoint security tools such as antivirus and EDR solutions, ensuring proper deployment and functionality across the environment. SOC Analysts stay current on emerging cybersecurity trends and share insights with the team to drive continuous improvement. They contribute to SOC policies, standard operating procedures, incident response playbooks, and maintain auditable records in alignment with organizational and regulatory standards.