About the Role:
We’re looking for a passionate and proactive SOC Analyst to join our growing team! In this role, you’ll play a key part in protecting our organization’s IT infrastructure and sensitive data from emerging cyber threats. As a member of our Security Operations Center (SOC), you’ll work in a dynamic, fast-paced environment where you’ll monitor, analyze, and respond to security incidents using advanced tools and techniques.
The ideal candidate will bring strong analytical skills, hands-on experience with threat detection and response, and a solid understanding of both cloud-based and on-premises environments. If you're ready to make a difference and help strengthen our cybersecurity posture, we'd love to hear from you!
Responsibilities:
- Monitor and Analyze: Use XDR/MDR, and other monitoring tools to track alerts, logs, and system events across environments like Microsoft 365, Google Workspace, and on-premises networks.
- Incident Response: Investigate, contain, and remediate security incidents, escalating when necessary. You'll also use endpoint protection tools to isolate threats.
- Threat Intelligence: Stay up to date with the latest threats and vulnerabilities, ensuring our organization remains proactive and prepared.
- Forensic Analysis: Perform forensic analysis on affected systems, documenting findings to support incident response and improve our future prevention strategies.
- Identity and Access Management: Help manage access controls in Active Directory, Intune, and cloud applications to ensure that proper security measures are in place.
- Documentation: Keep detailed records of incidents, response actions, playbooks, and analysis to support audits and help us continuously improve.
- Collaboration: Work closely with IT, DevOps, and other teams to identify and resolve security issues, enforce policies, and ensure network integrity.
- Reporting and Tool Optimization: Generate regular reports on security metrics, incidents, and SOC performance, while optimizing tools like XDR/MDR and to enhance detection capabilities.
Requirements:
- Education: Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent experience).
- Experience: 3+ years in a SOC or related cybersecurity role.
- Technical Skills:
- Proficiency with XDR/MDR or similar extended detection and response platforms.
- Experience with SIEM tools, IDS/IPS, and endpoint protection technologies (e.g., Windows Defender, Intune).
- Hands-on experience with Active Directory, Google Workspace, and Microsoft 365 security configurations.
- Basic knowledge of scripting languages (e.g., Python, PowerShell) is a plus.
- Familiarity with threat frameworks like MITRE ATT&CK.
- Certifications (preferred): Security+, CEH, CySA+, or other relevant cybersecurity certifications.
- Soft Skills: Strong analytical abilities, attention to detail, excellent communication skills, and the ability to work well under pressure and collaborate effectively with others.
If you’re a self-motivated individual with a passion for cybersecurity, we’d love for you to join our team and help us protect our digital world.
Job Types: Full-time, Permanent
Pay: $95,000.00-$105,000.00 per year
Benefits:
- Dental care
- Extended health care
- Paid time off
Flexible language requirement:
Schedule:
Application question(s):
- What certifications do you hold? Ex: Security+, CEH, CySA+, or other relevant cybersecurity certifications? Mention in the box below.
Education:
- Bachelor's Degree (preferred)
Experience:
- mdr/xdr tools: 2 years (preferred)
- SOC or other Cybersecurity field: 3 years (preferred)
Work Location: Remote