C2H Role || Senior SOC Analyst || Fully Remote

C2H Role || Senior SOC Analyst || Fully Remote

Posted 5 days ago by 1763191023

Negotiable
Outside
Remote
USA

Summary: The Senior SOC Analyst role is a fully remote position focused on enhancing security operations through incident response, threat intelligence, and monitoring using SIEM tools. Candidates are expected to have extensive experience in blue team operations and forensics, along with a strong understanding of compliance and policy frameworks. The position requires a proactive approach to security processes and effective communication skills. A background in Azure compliance and EDR is highly desirable.

Key Responsibilities:

  • Utilize SIEM tools to detect anomalies or attacks.
  • Identify, analyze, contain, and mitigate security incidents.
  • Study emerging threats, malware patterns, and attacker behaviors.
  • Document incidents, response actions, and prevention measures.
  • Conduct incident response along with SIEM, EDR, and compliance/policy experience.
  • Investigate Azure environments to ensure compliance with best practices.
  • Engage in technical writing and verbal communication regarding security processes.

Key Skills:

  • 5-6 years of technical hands-on experience in a SOC or related field.
  • Azure compliance experience.
  • EDR experience.
  • Knowledge of phishing.
  • SIEM/log experience.
  • Knowledge of networking and systems (Windows/Linux).
  • Preferred certifications: ITIL, CISSP, GIAC, GCIH, GNFA, GDAT.
  • Understanding of application traffic management solutions.
  • Solid understanding of TCP/IP and routing protocols.
  • Good investigation skills and curiosity for security processes.
  • Detailed knowledge of security architectures.
  • Working knowledge of modern operating systems (Linux, Windows, macOS).
  • College degree preferred.
  • Motivated self-starter.
  • Detail-oriented.

Salary (Rate): undetermined

City: undetermined

Country: USA

Working Arrangements: remote

IR35 Status: outside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

Senior SOC Analyst 100% remote

Top 3 Must Have Skills:

  • Blue Team Experience
  • Forensics
  • Monitoring: Using SIEM tools (like Splunk, QRadar, or Sentinel) to detect anomalies or attacks.
  • Incident Response: Identifying, analyzing, containing, and mitigating security incidents.
  • Threat Intelligence: Studying emerging threats, malware patterns, and attacker behaviors.
  • Reporting: Documenting incidents, response actions, and prevention measures.PowerShell/Shell Scripting
  • Incident response along with SIEM, EDR, Compliance/Policy Experience
  • PowerShell/Shell Scripting
  • Incident response along with SIEM, EDR, Compliance/Policy Experience

Requirements

  • 5-6 years of technical hands-on experience in a SOC or related field.
  • Azure Compliance Experience - investigating Azure environment and making sure they meet best practices
  • EDR Experience
  • Knowledge of phishing experience
  • SIEM/Log experience
  • Knowledge of networking and Systems (windows/linux)
  • Preferred Certifications but not limited to ITIL, CISSP, GIAC, GCIH, GNFA, and GDAT.
  • Functional understanding of a diverse set of networked applications requiring application traffic management solutions, including HTTP, HTTPS, SSH, FTP, DNS, and NTP services
  • Solid understanding of TCP/IP and routing protocols.
  • Good investigation skills and natural curiosity for security processes are desirable.
  • Detailed working knowledge of security architectures.
  • Working knowledge of modern operating systems, Linux, Windows, and macOS.
  • College Degree Preferred.
  • Motivated Self-starter.
  • Forward-thinking, detail-oriented person.
  • Technical writing and verbal communication skills.