SOC Analyst / Remote / EST Working time zone

SOC Analyst / Remote / EST Working time zone

Posted 2 weeks ago by Motion Recruitment

Negotiable
Outside
Remote
New York City, New York

Summary: The role of SOC Analyst involves a 3-4 month contract focused on incident triage and cybersecurity within a fast-growing team. The position requires hands-on experience with AWS Cloud security tools and SIEM alerts, emphasizing collaboration and innovation in a remote setting. Candidates should possess at least 2 years of relevant experience, particularly in cloud environments. This opportunity offers a chance to enhance skills while contributing to the protection of critical data and systems.

Key Responsibilities:

  • Conduct hands-on incident triage and remediation.
  • Investigate and analyze incidents using SIEM, AWS, and endpoint detection tools.
  • Collaborate with team members and report findings.
  • Utilize AWS Cloud security tools and respond to alerts.
  • Engage in phishing detection and incident response processes.

Key Skills:

  • Minimum 2 years of experience as an SOC Analyst.
  • Experience in triaging incidents from SIEM alerts, endpoint detection tools, and phishing detection.
  • Familiarity with AWS Cloud alerts and tools such as GuardDuty and CloudTrail.
  • Hands-on experience with common SOC tools (e.g., Splunk, CrowdStrike).
  • Solid understanding of cybersecurity frameworks and incident response processes.
  • Strong communication and collaboration skills.

Salary (Rate): 42.50

City: New York City

Country: United States

Working Arrangements: remote

IR35 Status: outside IR35

Seniority Level: Mid-Level

Industry: IT