About the job SOC Analyst (Security Operations Center Analyst) - Remote
Position Overview
We are seeking a proactive and detail-oriented SOC Analyst to monitor, detect, and respond to cybersecurity incidents in real time. The role involves working in a Security Operations Center (SOC) environment, analyzing security alerts, investigating suspicious activities, and escalating threats when necessary. The ideal candidate will have strong technical knowledge of security tools, threat detection, and incident response processes.
Key Responsibilities
-
Monitor and analyze security events and alerts from SIEM, IDS/IPS, EDR, firewalls, and other security tools.
-
Investigate and triage security incidents, determining severity and impact.
-
Respond to cybersecurity threats by containing, mitigating, and documenting incidents.
-
Conduct log analysis, packet analysis, and threat hunting activities.
-
Assist in developing and tuning correlation rules, detection signatures, and playbooks.
-
Escalate critical incidents to senior analysts or incident response teams.
-
Collaborate with IT, DevOps, and security engineers to ensure timely remediation.
-
Prepare incident reports, threat intelligence summaries, and SOC metrics dashboards.
-
Participate in red team/blue team exercises to improve detection and response.
-
Stay updated on the latest cyber threats, vulnerabilities, and attack techniques.
Qualifications
-
Bachelors degree in Cybersecurity, Information Technology, or related field (or equivalent experience).
-
13 years of experience in cybersecurity operations, SOC, or incident response.
-
Knowledge of common attack techniques, malware behavior, and threat actor tactics (MITRE ATT&CK framework).
-
Hands-on experience with SIEM tools (Splunk, QRadar, ELK, Microsoft Sentinel, ArcSight, etc.).
-
Familiarity with endpoint protection (EDR), firewalls, IDS/IPS, and threat intelligence platforms.
-
Basic knowledge of network protocols, operating systems (Windows, Linux), and cloud environments.
-
Strong analytical, problem-solving, and communication skills.
Preferred Skills
-
Security certifications such as:
-
CompTIA Security+ / CySA+
-
GIAC Security Essentials (GSEC)
-
GIAC Certified Incident Handler (GCIH)
-
Certified SOC Analyst (CSA)
-
-
Experience with threat hunting and malware analysis.
-
Familiarity with SOAR platforms (Security Orchestration, Automation & Response).
-
Knowledge of compliance frameworks (ISO 27001, NIST, GDPR, PCI-DSS, HIPAA).
Benefits
-
Competitive salary with performance bonuses.
-
Comprehensive health, dental, and vision insurance.
-
Certification sponsorship and professional development programs.
-
Flexible work schedule (onsite, hybrid, remote options).
-
Career growth opportunities into SOC Lead, Threat Hunter, or Incident Response Specialist roles.