Negotiable
Undetermined
Remote
Remote
Summary: The SOC Analyst role involves working remotely in an enterprise Security Operations Center (SOC) environment, requiring a minimum of two years of relevant experience and a bachelor's degree in cybersecurity or a related field. Candidates with a master's degree in cybersecurity are preferred. The position demands strong knowledge in network and host-based forensics, incident handling, and security tool monitoring.
Key Responsibilities:
- Conduct network and host-based forensics
- Perform information security investigations
- Handle and respond to security incidents
- Monitor security tools
- Analyze log files and digital evidence to support incident handling activities
Key Skills:
- 2+ years of experience in an enterprise SOC environment
- Bachelor's degree in cybersecurity, computer science, or related field
- Master's degree in cybersecurity (preferred)
- Knowledge of incident handling and response methodologies
- Experience with monitoring security tools
- Ability to analyze log files and digital evidence
- GIAC Certified Intrusion Analyst (GCIA) or GIAC (desired)
- Certified Incident Handler (GCIH) (desired)
Salary (Rate): undetermined
City: undetermined
Country: undetermined
Working Arrangements: remote
IR35 Status: undetermined
Seniority Level: undetermined
Industry: IT
Job Title: SOC Analysts
Work Location: RemoteActive Public Trust Clearance
Minimum Qualifications
- 2+ years of experience in an enterprise SOC environment
- Bachelor's degree in cybersecurity, computer science, or related field
- Preferred: Master's degree in cybersecurity
Knowledge and Skills
- Network and host-based forensics
Preferred: Master's degree in cybersecurity
Information security investigations
Incident handling and response methodologies
Monitoring security tools
Analysis of log files and digital evidence in support of incident handling activities
Desired Qualifications:
- GIAC Certified Intrusion Analyst (GCIA) or GIAC
- Certified Incident Handler (GCIH)