Monitor, analyze, and respond to cybersecurity threats across enterprise systems and networks. Identify security incidents, conduct investigations, and support incident response activities. Utilize threat intelligence feeds and frameworks to enhance detection.
Key Highlights
Technical Skills Required
Benefits & Perks
Job Description
Position Overview
- We are seeking a highly motivated Security Operations Center (SOC) Analyst to monitor, analyze, and respond to cybersecurity threats across enterprise systems and networks.
- The SOC Analyst will play a critical role in identifying security incidents, conducting investigations, and supporting incident response activities in a 24/7 security operations environment.
- The ideal candidate has hands-on experience with SIEM tools, threat detection, and incident handling, and is comfortable working in a fully remote setting within the United States.
Key Responsibilities
1. Security Monitoring & Detection
- Monitor security alerts and events using SIEM platforms (Splunk, Sentinel, QRadar, LogRhythm, etc.).
- Analyze logs from firewalls, IDS/IPS, EDR, servers, cloud platforms, and endpoints.
- Identify, triage, and prioritize security alerts based on severity and impact.
2. Incident Response & Investigation
- Investigate security incidents including phishing, malware, ransomware, account compromise, and insider threats.
- Perform root cause analysis and determine scope, impact, and remediation steps.
- Escalate incidents according to incident response procedures and SLAs.
- Assist in containment, eradication, and recovery activities.
3. Threat Intelligence & Hunting
- Utilize threat intelligence feeds and frameworks (MITRE ATT&CK) to enhance detection.
- Conduct proactive threat hunting to identify hidden or emerging threats.
- Stay current with new vulnerabilities, attack techniques, and threat actor behavior.
4. Documentation & Reporting
- Document incidents, findings, and response actions clearly and accurately.
- Prepare incident reports and metrics for internal stakeholders.
- Support compliance and audit requirements (SOC 2, ISO 27001, NIST, HIPAA, PCI-DSS).
5. Tooling & Process Improvement
- Tune SIEM rules and alerts to reduce false positives.
- Support integration of new security tools and log sources.
- Participate in SOC playbook creation and continuous improvement initiatives.
6. Collaboration & Communication
- Work closely with Incident Response, IT, Cloud, and DevOps teams.
- Communicate effectively during active incidents and post-incident reviews.
- Participate in shift handovers and on-call rotations as required.
Required Skills & Qualifications
Technical Skills
- 2–5+ years of experience in a SOC, security operations, or cybersecurity role.
- Hands-on experience with SIEM platforms (Splunk, Microsoft Sentinel, QRadar, etc.).
- Familiarity with EDR/XDR tools (CrowdStrike, SentinelOne, Defender, etc.).
- Strong understanding of networking fundamentals (TCP/IP, DNS, HTTP, VPNs).
- Experience analyzing logs from Windows, Linux, cloud platforms (AWS/Azure/GCP).
- Knowledge of malware analysis, phishing investigation, and threat detection techniques.
Security Frameworks & Standards
- Familiarity with MITRE ATT&CK, NIST CSF, and incident response frameworks.
- Understanding of common compliance standards (SOC 2, ISO 27001, HIPAA, PCI-DSS).