We are seeking a Tier 1 Reactive SOC Analyst to operate within a fast-paced MSSP environment. The role involves processing tickets, evaluating alerts, and deciding next steps. The ideal candidate will have strong analytical and problem-solving skills.
Key Highlights
Key Responsibilities
Technical Skills Required
Benefits & Perks
Nice to Have
Job Description
Job Title: Tier 1 Reactive SOC Analyst
Location: REMOTE; ET Hours (8am-5pm M-F)
Duration: PERM
Salary: $55k-75k
MUST HAVES:
- 1+ years of experience in a SOC, MSSP, or security-related role
- Basic understanding of cybersecurity fundamentals (networking, endpoints, attack techniques)
- Familiarity with SIEM and/or EDR tools
- Strong analytical and problem-solving skills
- Excellent written and verbal communication skills
- Ability to manage multiple customer environments simultaneously
- Comfortable working in a fully remote, shift-based, and/or on-call environment
Interested in remote work opportunities in Cyber Security? Discover Cyber Security Remote Jobs featuring exclusive positions from top companies that offer flexible work arrangements.
Browse our curated collection of remote jobs across all categories and industries, featuring positions from top companies worldwide.
Plusses:
- Experience with tools such as Rapid7 InsightIDR, SentinelOne, CrowdStrike, or Cortex XDR
- Understanding of MITRE ATT&CK or similar frameworks
- Relevant certifications (Security+, CySA+, or similar)
Day to day:
Our client is looking for Tier 1 Reactive SOC Analyst to operate within a fast‑paced MSSP environment supporting approximately 50 customer organizations, each with unique systems, tools, and security postures. Analysts are responsible for processing a steady flow of tickets, evaluating alerts to determine whether activity represents a legitimate cybersecurity threat, and deciding appropriate next steps, including escalation when necessary. Success in this role requires flexibility, adaptability, and the ability to operate independently in a dynamic, minimally structured environment without constant oversight. Analysts follow established processes while also critically evaluating how investigations are performed, focusing not only on outcomes but on improving detection quality and response workflows. The team is highly collaborative, and analysts are expected to contribute to shared standards, communicate clearly with teammates and customers, and participate in a 24/7 on‑call rotation (one week every seven weeks).
Similar Jobs
Explore other opportunities that match your interests
Cybersecurity & Identity Protection Engineer
BLACKCLOAK
D&H Distributing