Negotiable
Undetermined
Remote
Remote or Columbia, South Carolina
Summary: We are seeking a Remote SOC Analyst for a Tier 2 role focused on statewide security and incident response. The ideal candidate will have a passion for threat hunting and incident analysis. This position allows for 100% remote work, with a preference for local candidates who can work onsite as needed. The role involves driving security monitoring, threat detection, and incident response efforts.
Key Responsibilities:
- Drive security monitoring, threat detection, and incident response.
- Perform deep-dive investigations into suspicious activity.
- Collaborate with teams to fine-tune detection rules and SOC playbooks.
- Serve as a technical SME to help support and improve security service adoption.
Key Skills:
- 2+ Years in Security Monitoring and Incident Response.
- 2+ Years of experience with the MITRE ATT&CK framework.
- 2+ Years of experience in dashboard creation and reporting.
- Associate's degree in IT/Security (or 4 years of equivalent experience).
- Hands-on experience with Palo Alto Cortex XSIAM/XDR.
- Strong knowledge of Linux, network design, firewalls, and VPN technology.
- Relevant certifications (CISSP, CISA, CEH, etc.).
Salary (Rate): undetermined
City: Columbia
Country: United States
Working Arrangements: remote
IR35 Status: undetermined
Seniority Level: undetermined
Industry: IT
We are looking for a skilled Remote SOC Analyst to join our team! This is a high-impact, Tier 2 SOC role focused on safeguarding statewide security and incident response. If you are passionate about threat hunting and incident analysis, we want to hear from you.
Role Logistics:
- Work Arrangement: 100% Remote (Preference given to local candidates in Columbia, SC, who can work onsite as needed).
- Location: Primary location is 4430 Broad River Road, Columbia, SC.
- Interview Process: 1 round of virtual/online interviews, with the possibility of a second in-person round.
What You'll Do:
- Drive security monitoring, threat detection, and incident response.
- Perform deep-dive investigations into suspicious activity.
- Collaborate with teams to fine-tune detection rules and SOC playbooks.
- Serve as a technical SME to help support and improve security service adoption.
The Essentials (Must-Haves):
- 2+ Years in Security Monitoring and Incident Response.
- 2+ Years of experience with the MITRE ATT&CK framework.
- 2+ Years of experience in dashboard creation and reporting.
- Associate's degree in IT/Security (or 4 years of equivalent experience).
Bonus Points (Preferred):
- Hands-on experience with Palo Alto Cortex XSIAM/XDR.
- Strong knowledge of Linux, network design, firewalls, and VPN technology.
- Relevant certifications (CISSP, CISA, CEH, etc.).