$105,000–$140,000 Per Year
Our client, a managed security services provider, is hiring a remote Cybersecurity Analyst to join their 24x7 SOC. You'll triage alerts in their SIEM, investigate incidents, and contribute to detection engineering. This role fits an analyst who's comfortable in a fast-moving environment and ready to grow into a senior detection or response role.
Responsibilities
- Triage and investigate alerts surfaced by the SIEM and EDR platforms
- Lead incident response for confirmed security events
- Tune detections and contribute new detection logic
- Partner with engineering teams on remediation and hardening
- Document playbooks and post-incident reviews
Requirements
- 3+ years in a SOC, IR, or detection-engineering role
- Hands-on with at least one major SIEM (Splunk, Sentinel, Elastic, Chronicle)
- Strong understanding of TCP/IP, common attack patterns, and the MITRE ATT&CK framework
- Comfort with at least one scripting language (Python preferred)
- Excellent written communication for incident reports
Benefits
- Competitive base salary
- Medical, dental, and vision coverage
- 401(k) with match
- Remote-first culture
- Cert reimbursement (CISSP, GIAC, etc.)