CrawlJobs Logo
Briefcase Icon
Category Icon

SOC Analyst Jobs (Remote work)

4 Job Offers

Filters
L2 SOC Analyst
Save Icon
Join Quzara's remote Security Operations Center as an L2 SOC Analyst. Utilize your 5+ years of experience with Microsoft Sentinel, M365 Defender, and KQL to monitor, investigate, and respond to threats. This US-based role requires strong incident response skills, Azure security expertise, and adh...
Location Icon
Location
United States
Salary Icon
Salary
Not provided
quzara.com Logo
Quzara
Expiration Date
Until further notice
SOC Analyst – Intermediate
Save Icon
Join our Security Operations Center as an Intermediate SOC Analyst. You will triage and investigate security alerts from SIEM, EDR, and NGFW tools to detect and mitigate active threats. This role requires 2+ years of experience, relevant security technology knowledge, and participation in an on-c...
Location Icon
Location
United States
Salary Icon
Salary
Not provided
revelit.com Logo
Revel IT
Expiration Date
Until further notice
SOC Analyst I
Save Icon
Join RedHelm as a SOC Analyst I in the United States. Monitor, triage, and investigate security alerts using established playbooks. This entry-level role requires strong analytical skills, networking fundamentals, and clear communication. Contribute to high-quality security operations in a suppor...
Location Icon
Location
United States
Salary Icon
Salary
Not provided
1path.com Logo
RedHelm
Expiration Date
Until further notice
NIRT SOC Analyst - Junior to Mid Level
Save Icon
Join the National Incident Response and Threat (NIRT) team as a SOC Analyst. Monitor and analyze security alerts in a 24x7 environment, utilizing SIEM tools and network analysis. This role requires a U.S. Citizen eligible for clearance, with 0-2 years of experience in cybersecurity fundamentals. ...
Location Icon
Location
United States
Salary Icon
Salary
Not provided
mmcgrp.com Logo
MMC Group LP
Expiration Date
Until further notice
Explore the critical and dynamic world of Security Operations Center (SOC) Analyst jobs, a cornerstone profession in modern cybersecurity defense. SOC Analysts are the frontline defenders within an organization, responsible for the continuous monitoring, detection, investigation, and response to cyber threats. Working within a Security Operations Center, these professionals act as the central hub for security intelligence, vigilantly protecting digital assets, data, and infrastructure from a relentless landscape of attacks, breaches, and malicious activity. The profession typically involves a tiered structure, with responsibilities escalating with experience. Entry-level analysts are often tasked with real-time monitoring of security alerts generated by a vast array of tools like Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint detection and response (EDR) platforms. They triage these alerts, distinguishing false positives from genuine incidents, and follow established procedures and playbooks for initial containment. As analysts progress to higher tiers or specialized roles, their duties expand to include deep-dive incident response, forensic analysis, threat hunting to proactively search for indicators of compromise, and developing new detection methodologies. Common responsibilities across levels include documenting incidents meticulously, communicating with other IT and business units, and contributing to the refinement of security policies and procedures. To succeed in SOC Analyst jobs, a specific blend of technical and soft skills is essential. Foundational knowledge of networking concepts (TCP/IP, DNS, HTTP/S), operating systems (Windows, Linux), and core security principles is mandatory. Practical skills in analyzing log data, understanding malware behavior, and utilizing key security technologies are daily requirements. Increasingly, familiarity with cloud platforms (AWS, Azure, GCP) and scripting for automation (Python, PowerShell) is highly valued. Beyond technical prowess, strong analytical and problem-solving skills are crucial for piecing together evidence from disparate sources. Clear written and verbal communication is vital for documenting incidents and explaining technical risks to non-technical stakeholders. The ability to remain calm and effective under pressure during a security crisis defines the best in the field. While not always mandatory, relevant certifications such as CompTIA Security+, GIAC Certified Incident Handler (GCIH), or Certified Ethical Hacker (CEH) are common differentiators for candidates. The career path for SOC Analysts is robust, offering advancement into roles such as Incident Responder, Threat Hunter, SOC Team Lead, or Security Engineer. For those seeking a challenging, ever-evolving career at the heart of cybersecurity, SOC Analyst jobs provide an unparalleled opportunity to build a foundational skill set that is in constant global demand, offering the tangible reward of safeguarding organizations from digital harm.

Filters

×
Countries
Category
Location
Work Mode
Salary