Negotiable
Outside
Remote
USA
Summary: The Senior SOC Analyst role is a fully remote position focused on enhancing security operations through incident response, threat intelligence, and monitoring using SIEM tools. Candidates are expected to have extensive experience in blue team operations and forensics, along with a strong understanding of compliance and policy frameworks. The position requires a proactive approach to security processes and effective communication skills. A background in Azure compliance and EDR is highly desirable.
Key Responsibilities:
- Utilize SIEM tools to detect anomalies or attacks.
- Identify, analyze, contain, and mitigate security incidents.
- Study emerging threats, malware patterns, and attacker behaviors.
- Document incidents, response actions, and prevention measures.
- Conduct incident response along with SIEM, EDR, and compliance/policy experience.
- Investigate Azure environments to ensure compliance with best practices.
- Engage in technical writing and verbal communication regarding security processes.
Key Skills:
- 5-6 years of technical hands-on experience in a SOC or related field.
- Azure compliance experience.
- EDR experience.
- Knowledge of phishing.
- SIEM/log experience.
- Knowledge of networking and systems (Windows/Linux).
- Preferred certifications: ITIL, CISSP, GIAC, GCIH, GNFA, GDAT.
- Understanding of application traffic management solutions.
- Solid understanding of TCP/IP and routing protocols.
- Good investigation skills and curiosity for security processes.
- Detailed knowledge of security architectures.
- Working knowledge of modern operating systems (Linux, Windows, macOS).
- College degree preferred.
- Motivated self-starter.
- Detail-oriented.
Salary (Rate): undetermined
City: undetermined
Country: USA
Working Arrangements: remote
IR35 Status: outside IR35
Seniority Level: undetermined
Industry: IT
Senior SOC Analyst 100% remote
Top 3 Must Have Skills:
- Blue Team Experience
- Forensics
- Monitoring: Using SIEM tools (like Splunk, QRadar, or Sentinel) to detect anomalies or attacks.
- Incident Response: Identifying, analyzing, containing, and mitigating security incidents.
- Threat Intelligence: Studying emerging threats, malware patterns, and attacker behaviors.
- Reporting: Documenting incidents, response actions, and prevention measures.PowerShell/Shell Scripting
- Incident response along with SIEM, EDR, Compliance/Policy Experience
- PowerShell/Shell Scripting
- Incident response along with SIEM, EDR, Compliance/Policy Experience
Requirements
- 5-6 years of technical hands-on experience in a SOC or related field.
- Azure Compliance Experience - investigating Azure environment and making sure they meet best practices
- EDR Experience
- Knowledge of phishing experience
- SIEM/Log experience
- Knowledge of networking and Systems (windows/linux)
- Preferred Certifications but not limited to ITIL, CISSP, GIAC, GCIH, GNFA, and GDAT.
- Functional understanding of a diverse set of networked applications requiring application traffic management solutions, including HTTP, HTTPS, SSH, FTP, DNS, and NTP services
- Solid understanding of TCP/IP and routing protocols.
- Good investigation skills and natural curiosity for security processes are desirable.
- Detailed working knowledge of security architectures.
- Working knowledge of modern operating systems, Linux, Windows, and macOS.
- College Degree Preferred.
- Motivated Self-starter.
- Forward-thinking, detail-oriented person.
- Technical writing and verbal communication skills.