Security Operations Center Analyst

iConsultera • United State
Remote
Apply
AI Summary

The Security Operations Center Analyst monitors and analyzes cybersecurity threats, responds to incidents, and works in a fully remote environment. Key responsibilities include security monitoring and detection, incident response and investigation, and threat intelligence and hunting. The ideal candidate has hands-on experience with SIEM tools and a strong understanding of networking fundamentals and security frameworks.

Key Highlights
Monitor and analyze cybersecurity threats in a fully remote environment
Respond to incidents and perform root cause analysis
Utilize threat intelligence feeds and frameworks to enhance detection
Key Responsibilities
Monitor security alerts and events using SIEM platforms
Analyze logs from firewalls, IDS/IPS, EDR, servers, cloud platforms, and endpoints
Identify, triage, and prioritize security alerts based on severity and impact
Technical Skills Required
SIEM platforms (Splunk, Microsoft Sentinel, QRadar) EDR/XDR tools (CrowdStrike, SentinelOne, Defender) Networking fundamentals (TCP/IP, DNS, HTTP, VPNs) Malware analysis, phishing investigation, and threat detection techniques
Nice to Have
Security certifications (Security+, CEH, GCIA, GCIH, CySA+, or CISSP)
SOAR platform experience
Scripting experience (Python, PowerShell, Bash)

Job Description


Position Overview

  • We are seeking a highly motivated Security Operations Center (SOC) Analyst to monitor, analyze, and respond to cybersecurity threats across enterprise systems and networks.
  • The SOC Analyst will play a critical role in identifying security incidents, conducting investigations, and supporting incident response activities in a 24/7 security operations environment.
  • The ideal candidate has hands-on experience with SIEM tools, threat detection, and incident handling, and is comfortable working in a fully remote setting within the United States.


Key Responsibilities

1. Security Monitoring & Detection

  • Monitor security alerts and events using SIEM platforms (Splunk, Sentinel, QRadar, LogRhythm, etc.).
  • Analyze logs from firewalls, IDS/IPS, EDR, servers, cloud platforms, and endpoints.
  • Identify, triage, and prioritize security alerts based on severity and impact.

2. Incident Response & Investigation

  • Investigate security incidents including phishing, malware, ransomware, account compromise, and insider threats.
  • Perform root cause analysis and determine scope, impact, and remediation steps.
  • Escalate incidents according to incident response procedures and SLAs.
  • Assist in containment, eradication, and recovery activities.

3. Threat Intelligence & Hunting

  • Utilize threat intelligence feeds and frameworks (MITRE ATT&CK) to enhance detection.
  • Conduct proactive threat hunting to identify hidden or emerging threats.
  • Stay current with new vulnerabilities, attack techniques, and threat actor behavior.

4. Documentation & Reporting

  • Document incidents, findings, and response actions clearly and accurately.
  • Prepare incident reports and metrics for internal stakeholders.
  • Support compliance and audit requirements (SOC 2, ISO 27001, NIST, HIPAA, PCI-DSS).

5. Tooling & Process Improvement

  • Tune SIEM rules and alerts to reduce false positives.
  • Support integration of new security tools and log sources.
  • Participate in SOC playbook creation and continuous improvement initiatives.

6. Collaboration & Communication

  • Work closely with Incident Response, IT, Cloud, and DevOps teams.
  • Communicate effectively during active incidents and post-incident reviews.
  • Participate in shift handovers and on-call rotations as required.


Required Skills & Qualifications

Technical Skills

  • 2–5+ years of experience in a SOC, security operations, or cybersecurity role.
  • Hands-on experience with SIEM platforms (Splunk, Microsoft Sentinel, QRadar, etc.).
  • Familiarity with EDR/XDR tools (CrowdStrike, SentinelOne, Defender, etc.).
  • Strong understanding of networking fundamentals (TCP/IP, DNS, HTTP, VPNs).
  • Experience analyzing logs from Windows, Linux, cloud platforms (AWS/Azure/GCP).
  • Knowledge of malware analysis, phishing investigation, and threat detection techniques.

Security Frameworks & Standards

  • Familiarity with MITRE ATT&CK, NIST CSF, and incident response frameworks.
  • Understanding of common compliance standards (SOC 2, ISO 27001, HIPAA, PCI-DSS).

Preferred Qualifications

  • Security certifications such as Security+, CEH, GCIA, GCIH, CySA+, or CISSP.
  • Experience with SOAR platforms and automation tools.
  • Scripting experience (Python, PowerShell, Bash) for investigation and automation.
  • Cloud security monitoring experience (AWS GuardDuty, Azure Defender).

Soft Skills

  • Strong analytical and problem-solving skills.
  • Ability to remain calm and effective during security incidents.
  • Excellent written and verbal communication skills.
  • Ability to work independently in a remote environment.
  • Strong attention to detail and documentation skills.

Similar Jobs

Explore other opportunities that match your interests

Director, IT Engineering

Networking
•
3h ago
Visa Sponsorship Relocation Remote
Job Type Contract
Experience Level Director

next orbits inc

United State

Database Administrator

Networking
•
4h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Entry level

Oddball

United State

Identity and Access Management Engineer

Networking
•
6h ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

TEKsystems

United State

Subscribe our newsletter

New Things Will Always Update Regularly