SOC Analyst - 100% Remote

Other Jobs To Apply

Security Operations Analyst - Contract - 100% Remote - (US Only)

The Security Operations Center (SOC) Analyst is the first line of defense for the Information Security team. This role is responsible for receiving, researching, triaging, and documenting all security events and alerts as they are received as well as utilizing threat intelligence information to hunt for potential security issues across the entire enterprise.

An analyst will interact with multiple groups and individuals across all organizations and teams throughout the organization to help defend and maintain a strong security posture. The SOC analyst reports directly to the SOC manager and is a critical member of the team. This role will develop an in-depth understanding of new trends and technologies related to information security and compliance, specifically those targeting cloud and software-as-a-service style enterprises, and they will contribute towards our Information Security strategy and roadmap.

Skills:
B.S. or M.S. in Computer Science, Software Engineering, or a comparable field.
10-12+ years of solid commercial experience in Information Security.
• Must have experience with -

o Information security monitoring and response

o Security Operations,
• Must have strong experience with SIEM products - Splunk and Splunk Enterprise Security.
• Must have experience with Cloud Security with Amazon Web Services (AWS).
• Experience with Linux/Unix operating systems; General security principles, web applications, and risk and compliance initiatives.
• Strong ethical and discretionary ability to handle sensitive information and data.
• Strong communication & social networking skills (written, verbal, listening) to collaborate with other teams across the organization.
• Excellent critical thinking and problem-solving skills.
• Self-motivated to research with a strong desire to understand how things work.
• Highly organized and efficient.

Responsibilities:
• Assist in establishing and maintaining a mature and organized Security Operations Center through the evaluation of existing and proposed SOC policies, playbooks, and procedures.
• Support cross-team and department collaboration to monitor and respond to security events or reported issues as they arise.
• Participate in regular incident responses, threat modeling activities, and retro exercises to hone and iteratively improve our detection, monitoring, and reactive capabilities.
• Stay current with and remain knowledgeable about developing threats through analyzing attacker tactics, techniques, and procedures (TTPs) that target large cloud-first infrastructure and end-user devices.
• Define, create, and maintain automation and orchestration solutions to automate, enrich and/or respond to ongoing threats and tasks.
• Mature our incident response playbooks and procedures through triage, escalation, remediation, and iterative documentation.
• Research and explore new threat detection and hunting techniques across event data collected across multiple systems and environments.
• Adhere to and establish service level agreements (SLAs) and create measurable benchmarks to show progress and improvement to our defensive capabilities and coverage.

Duration - 6 Months + extendible

Time-Zone - CST

The interview process will include 2 rounds of technical interviews.
Back to blog