Cybersecurity Analyst (SOC / Threat Detection / Incident Response)
Posted 5/1/2026
Apply by 6/30/2026
Location Detroit Metropolitan Area, us
Type Contract
Compensation US Dollars 90 / Hourly
Job description
**Location:** Oakland County, MI (Onsite/Hybrid – details to be confirmed)
**Duration:** 12 Months (Extension Possible)
**Start Date:** June 30, 2026
**Experience Level:** Junior to Mid-Level
**Work Authorization:** U.S.-based candidates only
### **Overview**
We are seeking a motivated **Cybersecurity Analyst** to support enterprise security operations in a dynamic public-sector environment. This role is ideal for professionals with hands-on experience in security monitoring, threat detection, or network security who are eager to grow and deepen their expertise across multiple domains of information security.
You will play a key role in evaluating system security, identifying risks, and supporting incident response efforts to ensure the integrity and protection of organizational systems and data.
### **Key Responsibilities**
**Security Operations & Monitoring**
* Perform security and integrity reviews of IT systems and data platforms
* Monitor, detect, and respond to potential security threats and incidents
* Support threat hunting and detection engineering initiatives
**Technical Analysis & Troubleshooting**
* Investigate and troubleshoot security and system-related issues
* Document findings, processes, and remediation steps
* Assist in improving detection and response capabilities
**Risk & Control Assessment**
* Evaluate internal controls, technical processes, and system effectiveness
* Support implementation and validation of security best practices
**Collaboration & Communication**
* Engage with internal stakeholders through email, chat, and virtual meetings
* Clearly communicate technical findings to both technical and non-technical audiences
### **Required Qualifications**
* Minimum **2+ years of hands-on experience** in at least one of the following:
* SOC Operations
* Threat Hunting
* Detection Engineering
* Network Security Engineering
* Experience troubleshooting technical systems and documenting solutions
* Strong communication skills in client-facing or collaborative environments
* Demonstrated interest in cybersecurity trends and evolving threat landscape
### **Core Knowledge Areas**
Candidates should have working knowledge in **at least three (3)** of the following:
* Governance, Risk, and Compliance (GRC)
* Cloud Security & Hosted Applications
* Application Security & OWASP concepts
* Network Security & Zero Trust Architecture
* Endpoint Security & OS Hardening
* Incident Response & Remediation
* Vulnerability Management
* Cyber Threat Intelligence (CTI)
* Malware Analysis / Digital Forensics
* Security Automation (PowerShell, Python, Bash, etc.)
* Data Protection & Encryption
### **Preferred Qualifications**
* Certifications such as **CRISC (ISACA)** or **SSCP (ISC2)**
* Experience with **SOAR platforms** or security automation tools
* Familiarity with **NIST frameworks** (CSF, 800-53, 800-207)
* Knowledge of **MITRE ATT\&CK framework**
* Exposure to **AI tools** for security automation or research
* Experience with penetration testing or red team activities
* Active involvement in the cybersecurity community
### **Additional Details**
* Background check required
* Strong learning mindset and adaptability are key to success in this role
Work setting
Onsite