Senior SOC Analyst (Remote)

Insight Global • United State
Remote
This Job is No Longer Active This position is no longer accepting applications
AI Summary

Join Insight Global's tight-knit Security Operations Center team as a Senior SOC Analyst. This role involves responding to security incidents, configuring security agents, and collaborating with colleagues. Experience in MSSP and SOC environments is required.

Key Highlights
Respond to security incidents and escalate Tier 1/Tier 2 tickets
Configure security agents, troubleshoot, and report security issues
Collaborate with colleagues in Security and IT
Experience in MSSP and SOC environments required
Technical Skills Required
SIEM (SumoLogic, Splunk) Endpoint Detection and Response Tools Application Whitelisting Endpoint and Network Monitoring Microsoft Defender EDR or XDR Powershell Python Azure
Benefits & Perks
Remote work
Medical, dental, and vision insurance
HSA, FSA, and DCFSA account options
401k retirement account access with employer matching
Paid sick leave and/or other paid time off

Job Description


Our client is looking for a SOC Analyst to sit fully remote in the US. This analyst will be reporting to the Manager of the Security Operations Center and will be joining the larger Information Security team. 25% of their day will be responding, reviewing, and escalating Tier 1/Tier 2 tickets in Service Now. Another 25% of their day will be spent configuring security agents, troubleshooting, and reporting any and all activities related to security issues that occur during their shift. Examples of tools this role utilizes to troubleshoot include: SIEM, Endpoint Detection and Response Tools, Application Whitelisting, and Endpoint and Network Monitoring. An additional 25% of their day is completing ad hoc IT Security tasks like Web Content Filtering, escalations from 3rd party MSSP File Monitoring, and support to end users. The final 25% of their day will be spent communicating and coordinating with colleagues in Security and IT. This team is tight knit, and they are looking for someone that they can bond with and get to know.



Required Skills & Experience


3+ years of experience in a MSSP (Managed Security Service Provider) role

Experience working in a SOC environment

Experience with Microsoft Defender EDR or XDR

SIEM platform experience preferably SumoLogic

Another ex. Splunk

Incident Response experience – full understanding of the incident response life cycle


Nice to Have Skills & Experience


Experience creating detection logic

Forensic knowledge

Familiarity with Active Directory

Scripting technologies (Powershell, Python)

Familiarity with cloud technologies (Azure)

Certificate in Networking or Security


$30/hr to $34/hr.

Exact compensation may vary based on several factors, including skills, experience, and education.

Benefit packages for this role will start on the 31st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law.


Similar Jobs

Explore other opportunities that match your interests

Network/Firewall/WAF Administrator

Networking
•
11m ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

Experis

United State

Senior Linux & Oracle Cloud Infrastructure Administrator

Networking
•
4h ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

Mitratech

United State

Entry-Level Database Administrator

Networking
•
10h ago
Visa Sponsorship Relocation Remote
Job Type Contract
Experience Level Entry level

codevista solution

United State

Subscribe our newsletter

New Things Will Always Update Regularly