Tier 2 SOC Analyst

Binary Defense • United State
Remote
Apply
AI Summary

Detect and respond to information security incidents, maintain security event alerting procedures, and participate in security investigations. Collaborate with customers and junior analysts. 3+ years of experience in a Security Operations Center required.

Key Highlights
24x7x365 security operations
Information security incident detection and response
Security event alerting and investigation
Key Responsibilities
Actively participate in and contribute to 24x7x365 security operations
Actively monitor and react across multiple customer environments and provide comprehensive analysis and investigation of notable events as directed
Communicate and collaborate with customers through the lifecycle of all escalated security events and investigations
Proactively identify areas of maturation surrounding detections and playbooks while collaborating across organizational lines to implement proposed changes without compromising key tactical vantage points of visibility
Proactively identify opportunities to improve workflow of junior analysts within applicable services
Mentor assigned Tier 1 SOC Analysts
Technical Skills Required
Lockheed Martin's Cyber Kill Chain MITRE ATT&CK Framework SOAR platforms
Benefits & Perks
100% remote work
Hourly W-2 compensation
Possibility of permanent position with full benefits after 6 months
Nice to Have
CISSP
GCIH
GCIA
GCDA
GMON

Job Description


Binary Defense is seeking a talented Tier 2 SOC Analyst to be part of a 24x7x365 Security Operations Center team. This position is 100% Remote. You will be provided with equipment to work remotely and will receive training on our clients, processes, and technologies.


PLEASE NOTE: This is a 6+ month contract position with no benefits. You will be paid on an hourly, W-2 basis. After 6 months, there is a possibility of this becoming a permanent, full-time, salary position with full benefits.


The SOC Analyst will work collaboratively to detect and respond to information security incidents, maintain and follow procedures for security event alerting, and participate in security investigations.


Responsibilities:


  • Actively participate in and contribute to 24x7x365 security operations
  • Actively monitor and react across multiple customer environments and provide comprehensive analysis and investigation of notable events as directed
  • Communicate and collaborate with customers through the lifecycle of all escalated security events and investigations.
  • Proactively identify areas of maturation surrounding detections and playbooks while collaborating across organizational lines to implement proposed changes without compromising key tactical vantage points of visibility.
  • Proactively identify opportunities to improve workflow of junior analysts within applicable services
  • Mentor assigned Tier 1 SOC Analysts


Requirements:


  • 3+ years experience working within a Security Operations Center.
  • 3+ years experience working across multiple security disciplines (DFIR, log analysis, packet analysis, etc.)
  • Demonstrated knowledge and experience with Lockheed Martin’s Cyber Kill Chain and the MITRE ATT&CK Framework
  • Experience working within 1 or more SOAR platforms preferred.
  • Preferred certifications: CISSP, GCIH, GCIA, GCDA, GMON

Similar Jobs

Explore other opportunities that match your interests

AI Training Infrastructure Expert

Networking
•
21h ago
Visa Sponsorship Relocation Remote
Job Type Contract
Experience Level Mid-Senior level

Alignerr

United State

Network Engineer (Part-Time/Full-Time)

Networking
•
21h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Entry level

javelin

United State

Implementation Engineer II

Networking
•
21h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

i.t. right, inc - a vc3 compan...

United State

Subscribe our newsletter

New Things Will Always Update Regularly