Detect and respond to information security incidents, maintain security event alerting procedures, and participate in security investigations. Collaborate with customers and junior analysts. 3+ years of experience in a Security Operations Center required.
Key Highlights
Key Responsibilities
Technical Skills Required
Benefits & Perks
Nice to Have
Job Description
Binary Defense is seeking a talented Tier 2 SOC Analyst to be part of a 24x7x365 Security Operations Center team. This position is 100% Remote. You will be provided with equipment to work remotely and will receive training on our clients, processes, and technologies.
PLEASE NOTE: This is a 6+ month contract position with no benefits. You will be paid on an hourly, W-2 basis. After 6 months, there is a possibility of this becoming a permanent, full-time, salary position with full benefits.
The SOC Analyst will work collaboratively to detect and respond to information security incidents, maintain and follow procedures for security event alerting, and participate in security investigations.
Responsibilities:
Interested in remote work opportunities in IT & Network Engineering? Discover IT & Network Engineering Remote Jobs featuring exclusive positions from top companies that offer flexible work arrangements.
- Actively participate in and contribute to 24x7x365 security operations
- Actively monitor and react across multiple customer environments and provide comprehensive analysis and investigation of notable events as directed
- Communicate and collaborate with customers through the lifecycle of all escalated security events and investigations.
- Proactively identify areas of maturation surrounding detections and playbooks while collaborating across organizational lines to implement proposed changes without compromising key tactical vantage points of visibility.
- Proactively identify opportunities to improve workflow of junior analysts within applicable services
- Mentor assigned Tier 1 SOC Analysts
Browse our curated collection of remote jobs across all categories and industries, featuring positions from top companies worldwide.
Requirements:
- 3+ years experience working within a Security Operations Center.
- 3+ years experience working across multiple security disciplines (DFIR, log analysis, packet analysis, etc.)
- Demonstrated knowledge and experience with Lockheed Martin’s Cyber Kill Chain and the MITRE ATT&CK Framework
- Experience working within 1 or more SOAR platforms preferred.
- Preferred certifications: CISSP, GCIH, GCIA, GCDA, GMON
Similar Jobs
Explore other opportunities that match your interests
Alignerr
javelin