Negotiable
Outside
Remote
USA
Summary: The SOC Analyst role involves working in a 24x7x365 Security Operations Center (SOC) environment, focusing on analyzing and responding to security incidents. The position requires conducting investigations using various tools and supporting vulnerability assessments while maintaining detailed documentation. The analyst will also participate in proactive threat hunting and coordinate incident response activities. A strong background in cybersecurity and relevant experience in a SOC environment is essential for this role.
Key Responsibilities:
- Perform alternating shift work in a 24x7x365 SOC environment.
- Analyze and respond to security alerts and incidents, escalating as needed.
- Conduct in-depth investigations using SIEM, threat intelligence, and log analysis tools.
- Support vulnerability analysis and risk assessments across enterprise environments.
- Maintain and manage SOC ticket queues with detailed documentation.
- Participate in proactive threat hunting and incident response activities.
- Review and update security policies, procedures, and documentation.
- Coordinate containment, eradication, and recovery during security incidents.
Key Skills:
- Bachelor's degree in Cybersecurity, Information Systems, or related field.
- 7+ years of cybersecurity experience, with at least 5 years in a 24x7x365 SOC environment.
- Strong background in incident detection, analysis, and response.
- Hands-on experience with tools such as SIEM/SOAR, NGAV/EDR, vulnerability scanners, and threat intelligence platforms.
- Solid understanding of cloud and hybrid environments, cyber intrusion frameworks (MITRE ATT&CK, Cyber Kill Chain), and Federal Security Standards (NIST, FedRAMP).
- Scripting skills in Python, Bash, PowerShell, or similar.
- Experience in two or more specialized areas: Insider Threat, Digital Forensics, Incident Response, or Monitoring and Detection.
Salary (Rate): undetermined
City: undetermined
Country: USA
Working Arrangements: remote
IR35 Status: outside IR35
Seniority Level: undetermined
Industry: IT
Key Responsibilities:
- Perform alternating shift work in a 24x7x365 SOC environment.
- Analyze and respond to security alerts and incidents, escalating as needed.
- Conduct in-depth investigations using SIEM, threat intelligence, and log analysis tools.
- Support vulnerability analysis and risk assessments across enterprise environments.
- Maintain and manage SOC ticket queues with detailed documentation.
- Participate in proactive threat hunting and incident response activities.
- Review and update security policies, procedures, and documentation.
- Coordinate containment, eradication, and recovery during security incidents.
Required Skills & Qualifications:
- Bachelor s degree in Cybersecurity, Information Systems, or related field.
- 7+ years of cybersecurity experience, with at least 5 years in a 24x7x365 SOC environment.
- Strong background in incident detection, analysis, and response.
- Hands-on experience with tools such as SIEM/SOAR, NGAV/EDR, vulnerability scanners, and threat intelligence platforms.
- Solid understanding of cloud and hybrid environments, cyber intrusion frameworks (MITRE ATT&CK, Cyber Kill Chain), and Federal Security Standards (NIST, FedRAMP).
- Scripting skills in Python, Bash, PowerShell, or similar.
- Experience in two or more specialized areas: Insider Threat, Digital Forensics, Incident Response, or Monitoring and Detection.
Preferred Certifications:
- Security+, CEH, CFR, CySA+, GCIA, GCIH, GICSP, Cloud+, SCYBER, PenTest+, CCNA Cyber Ops, CCNA-Security.