Listing Description
Job Title: Tier 2 SOC Analyst
Company: Cybrella (https://www.cybrella.io/)
Employment: Full Time, Direct Hire
Location: Fully Remote, location open – must be able to work Central Time hours
Job Description:
We are seeking a skilled Tier 2 SOC Analyst to join a dynamic cybersecurity team (Cyber Threat Intelligence, Managed SOC division). You will play a critical role in maintaining the security of organizations by monitoring, detecting, and responding to potential cyber threats.
Key Responsibilities:
Monitor security events and incidents from various sources, including SIEM (Security Information and Event Management) tools and endpoint protection platforms.
Conduct analysis of security events to identify indicators of compromise (IOCs) and determine the scope, urgency, and potential impact of security incidents.
Perform in-depth investigation and analysis of escalated security incidents, applying advanced knowledge of malware analysis, forensic analysis, and threat intelligence.
Provide recommendations for containment, eradication, and recovery in response to security incidents.
Collaborate with other Analysts to enhance detection capabilities and streamline incident handling procedures.
Document all actions taken during incident response and ensure proper handoff to appropriate teams for further escalation, if needed.
Stay current with emerging threats, vulnerabilities, and security technologies by actively participating in training opportunities and industry information sharing forums.
Required Skills and Qualifications:
Bachelor’s degree in Computer Science, Information Technology, or a related field (or equivalent work experience).
Proven experience in a Security Operations Center (SOC) environment, with specific experience in incident detection, analysis, and response.
Strong understanding of network protocols, security devices (firewalls, IDS/IPS), and endpoint security solutions.
Proficiency in using/configuring SIEM tools and other security monitoring platforms (e.g., Splunk, ArcSight, QRadar).
Proficency in using/configuring EDR tools and other endpoint security solutions (e.g., CrowdStrike, SentinelOne, Cortex, Carbon Black)
Experience with malware analysis, packet analysis, and forensic tools.
Excellent problem-solving skills and the ability to work under pressure in a fast-paced environment.
Strong communication skills, with the ability to convey technical details clearly to both technical and non-technical audiences.
Spanish fluency, ability to support and communicate with clients that are native Spanish speakers.
Experience automating SOC workflows and processes is a plus.
Why Join:
Opportunity to work with cutting-edge cybersecurity technologies in a premier, next-gen boutique cybersecurity provider and contribute to the security posture of a leading organization.
Competitive salary and comprehensive benefits package – salary range expected to be between $80,000 - $110,000 commensurate with experience. Flexibility with that range can be considered on a case by case basis.
Professional development opportunities and career growth within a supportive and collaborative team environment.
Listing Details
- Salary: $80000 - $110000
- Citizenship: Us Citizen
- Incentives: Not Provided
- Education: Not Provided
- Travel: No Travel
- Telework: Full Telecommute