Security Operations Center (SOC) Analyst
Position Overview
The Security Operations Center (SOC) Analyst plays a critical role in protecting Calian customers nationwide by monitoring, detecting, and responding to cybersecurity threats. As a key member of the cybersecurity incident response team, the SOC Analyst serves as the first line of defense against security incidents. This role offers hands-on experience with advanced network and endpoint detection technologies, SIEM platforms, and incident response tools, supporting a comprehensive and evolving cybersecurity program.
The SOC Analyst is responsible for analyzing, identifying, and resolving security alerts and events in a fast-paced, mission-driven environment.
Responsibilities
- Perform real-time, proactive security monitoring, detection, and response to cybersecurity events
- Conduct incident response activities including triage, analysis, containment, remediation, and recovery
- Investigate security alerts generated by SIEM, IDS/IPS, antivirus, endpoint tools, and customer escalations
- Identify indicators of compromise and recognize successful or attempted intrusions
- Differentiate false positives from genuine security incidents
- Launch, track, and manage investigations through resolution
- Respond to security alerts and escalations in a timely and effective manner
- Communicate investigation findings clearly to technical and non-technical stakeholders
- Maintain situational awareness of emerging threats, vulnerabilities, and mitigation strategies
- Participate in the Computer Security Incident Response Team (CSIRT)
- Provide on-call support for after-hours security-related events
- Perform other duties as assigned and support team objectives
Qualifications
- Bachelor’s degree in Engineering, Computer Science, Information Security, Information Systems, or equivalent work experience
- Experience working with security tools such as SIEM, IDS/IPS, antivirus, and endpoint detection platforms
- Understanding of network architecture, TCP/IP, and network traffic capture and analysis
- Experience reviewing Windows and Linux (*nix) system and audit logs
- Knowledge of vulnerability management and risk-based security models
- Familiarity with penetration testing tools, techniques, and methodologies
- Programming or scripting experience preferred
- Understanding of syslog functionality
- Strong analytical, investigative, and problem-solving skills
- Excellent communication skills at both technical and business levels
- Ability to work collaboratively in a team-oriented, customer-focused environment
Additional Requirements
- Willingness to participate in an on-call rotation for after-hours incident response
- Demonstrated commitment to customer satisfaction and respectful collaboration
- Ability to perform essential job functions with or without reasonable accommodation
- Experience in a customer service–oriented role preferred
Compensation
$65,000 - $70,000
Vacancy
We have 1 available position.
Perks And Benefits
- Flexible work hours
- Robust company-paid benefits
- Generous time off package
- A balanced approach to work and life
- Stock purchase plan
- RRSP program*
- Work from home options