Tier 1 Reactive SOC Analyst

Insight Global • United State
Remote
Apply
AI Summary

We are seeking a Tier 1 Reactive SOC Analyst to operate within a fast-paced MSSP environment. The role involves processing tickets, evaluating alerts, and deciding next steps. The ideal candidate will have strong analytical and problem-solving skills.

Key Highlights
Fast-paced MSSP environment
Processing tickets and evaluating alerts
Strong analytical and problem-solving skills
Key Responsibilities
Processing a steady flow of tickets
Evaluating alerts to determine whether activity represents a legitimate cybersecurity threat
Deciding appropriate next steps, including escalation when necessary
Technical Skills Required
SIEM EDR tools Networking Attack techniques
Benefits & Perks
$55k-75k salary
Remote work
8am-5pm ET hours
Nice to Have
Rapid7 InsightIDR
SentinelOne
CrowdStrike
Cortex XDR
MITRE ATT&CK
Security+, CySA+

Job Description


Job Title: Tier 1 Reactive SOC Analyst

Location: REMOTE; ET Hours (8am-5pm M-F)

Duration: PERM

Salary: $55k-75k

MUST HAVES:

  • 1+ years of experience in a SOC, MSSP, or security-related role
  • Basic understanding of cybersecurity fundamentals (networking, endpoints, attack techniques)
  • Familiarity with SIEM and/or EDR tools
  • Strong analytical and problem-solving skills
  • Excellent written and verbal communication skills
  • Ability to manage multiple customer environments simultaneously
  • Comfortable working in a fully remote, shift-based, and/or on-call environment

Plusses:

  • Experience with tools such as Rapid7 InsightIDR, SentinelOne, CrowdStrike, or Cortex XDR
  • Understanding of MITRE ATT&CK or similar frameworks
  • Relevant certifications (Security+, CySA+, or similar)

Day to day:

Our client is looking for Tier 1 Reactive SOC Analyst to operate within a fast‑paced MSSP environment supporting approximately 50 customer organizations, each with unique systems, tools, and security postures. Analysts are responsible for processing a steady flow of tickets, evaluating alerts to determine whether activity represents a legitimate cybersecurity threat, and deciding appropriate next steps, including escalation when necessary. Success in this role requires flexibility, adaptability, and the ability to operate independently in a dynamic, minimally structured environment without constant oversight. Analysts follow established processes while also critically evaluating how investigations are performed, focusing not only on outcomes but on improving detection quality and response workflows. The team is highly collaborative, and analysts are expected to contribute to shared standards, communicate clearly with teammates and customers, and participate in a 24/7 on‑call rotation (one week every seven weeks).


Similar Jobs

Explore other opportunities that match your interests

Cybersecurity & Identity Protection Engineer

Cyber Security
•
10h ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

BLACKCLOAK

United State

Cybersecurity Architect

Cyber Security
•
10h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

D&H Distributing

United State
Visa Sponsorship Relocation Remote
Job Type Contract
Experience Level Mid-Senior level

Radiant Digital

United State

Subscribe our newsletter

New Things Will Always Update Regularly