CrawlJobs Logo

SOC Analyst I

1path.com Logo

RedHelm

Location Icon

Location:
United States

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

RedHelm is seeking a SOC Analyst I to support the monitoring, analysis, and response to security alerts, events, and incidents in accordance with established procedures and playbooks. This role requires sound analytical judgment, strong documentation skills, and the ability to communicate findings clearly and professionally. In this role, you’ll independently triage and investigate common alert types, recognize patterns and indicators of compromise, and escalate incidents appropriately while contributing to consistent, high-quality SOC operations.

Job Responsibility:

  • Monitor, triage, and respond to security alerts, events, and incidents in accordance with defined SOC procedures and playbooks
  • Perform initial investigations to determine alert validity, scope, and potential impact
  • Accurately document investigations, actions taken, and outcomes within the ticketing system
  • Independently handle routine and low-to-moderate severity alerts and escalate higher-risk incidents as required
  • Identify patterns, recurring alerts, or anomalies and document findings for review by senior analysts
  • Communicate investigation findings clearly and professionally with internal teams and customers
  • Assist in identifying potential security gaps or misconfigurations and escalate observations appropriately
  • Support the monitoring and day-to-day operation of security tools and platforms
  • Follow all information security, privacy, and data protection policies when handling client data
  • Contribute to the maintenance and improvement of SOC documentation, procedures, and playbooks
  • Stay informed on common attack techniques, emerging threats, and relevant vulnerabilities
  • Maintain focus and accuracy while working in a fast-paced, alert-driven environment

Requirements:

  • Exposure to a SOC, NOC, IT support, or similar technical operations environment
  • Familiarity with security monitoring concepts, incident response workflows, or alert handling
  • Experience working with ticketing systems or case management tools
  • Academic, internship, lab, or entry-level professional experience in cybersecurity, IT, or related fields
  • Strong written and verbal communication skills, particularly in documenting and explaining technical findings
  • Solid understanding of networking and security fundamentals
  • Ability to analyze alerts, logs, and events to determine appropriate response
  • Strong attention to detail and consistency in documentation and process adherence
  • Ability to prioritize workload and follow established escalation procedures
  • Customer-focused mindset with the ability to remain calm and professional during incidents
  • Associate’s or Bachelor’s degree in a relevant field, or equivalent professional experience
  • Security+ or similar foundational security certification preferred but not required
  • Successful completion of federal and state background checks and credit checks is required

Nice to have:

Basic familiarity with scripting or automation concepts is a plus

Additional Information:

Job Posted:
January 05, 2026

Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for SOC Analyst I

L2 SOC Analyst

Quzara, a leading Cyber Security Firm, is seeking a highly skilled and experienc...
Location
Location
United States
Salary
Salary:
Not provided
quzara.com Logo
Quzara
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5+ years of experience in a SOC Analyst role at a SOC/MXDR or MSSP with L2 experience
  • Strong understanding of networking technologies
  • Experience with Microsoft security technologies such as Microsoft Sentinel and M365 Defender
  • Strong understanding of security best practices and incident response procedures
  • Experience with deep threat intelligence
  • Strong proficiency with KQL Queries
  • Strong verbal and written communication skills
  • Strong analytical and problem-solving skills
  • Azure experience working with azure security is a must
  • Experience with scripting languages such as Python, PowerShell, and JavaScript
Job Responsibility
Job Responsibility
  • Monitor and analyze security events utilizing advanced security technologies and tools such as Microsoft Sentinel, Defender technologies, and Log Analytics
  • Utilize deep threat intelligence to identify and investigate potential security threats
  • Respond to and triage security incidents, escalating as necessary
  • Utilize proficiency in KQL Queries to conduct investigations and gain insights into potential security threats
  • Collaborate with other teams to resolve security incidents and improve overall security posture
  • Participate in incident response efforts and assist in forensic investigations, adhering to NIST guidelines
  • Continuously improve security operations through the identification of trends and anomalies
  • Communicate security incidents and findings to stakeholders and management
  • Fulltime
Read More
Arrow Right

SOC Analyst – Intermediate

Under the general direction of the management team and senior staff, Security Op...
Location
Location
United States
Salary
Salary:
Not provided
revelit.com Logo
Revel IT
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Typically has a 4-year academic degree and 2+ years of information security or equivalent practical work experience
  • Demonstrates and applies thorough understanding of information technology tools, best practices, and concepts
  • Completes on-going training on-the-job, through courses, self-study, certifications and/or advanced degrees to maintain and enhance technical and business capabilities
  • Maintains current knowledge of security techniques and technologies and applies that knowledge to mitigate risk
  • Participates in an On-Call Team rotation
  • Previous experience with some of the following security technologies: Security information and event management (SIEM), Endpoint Detection and Response (EDR), Anti-Virus, IDS/IPS, and NGFW solutions
  • Knowledge of tactics attackers are using while continuing to monitor for new tactics and procedures being utilized
Job Responsibility
Job Responsibility
  • Provide service to IT client community, patients, families and visitors, while protecting the integrity and confidentiality of all data and information through physical and electronic measures
  • Monitor and investigate security alerts to detect malicious activity that originate from the SIEM, NGFW, EDR, NGAV, etc
  • Follow incident specific playbooks and procedures documented by SOC leadership while investigating and responding to malicious activity
  • Maintain accurate notes in the case management system
  • Proactively identify and remediate threats occurring in the environment by demonstrating the ability to hunt in SIEM and EDR solutions
  • Provide on-call support at designated times in accordance with the policies and procedures of the Health System
  • Collaborate with the team and answer any questions that other analysts may have
  • Assist in the training of new team members
  • Assist in investigating alerts escalated by associate level staff members
  • Work independently to investigate security incidents and alerts
  • Fulltime
Read More
Arrow Right

SOC Analyst

We are seeking a SOC Analyst to strengthen its cybersecurity operations. This ro...
Location
Location
United States , Jersey City
Salary
Salary:
Not provided
https://www.roberthalf.com Logo
Robert Half
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience with SIEM tools (Sentinel, AlienVault) and EDR solutions (CrowdStrike, SentinelOne)
  • Strong knowledge of cloud security (AWS, Azure) and DevSecOps tools (Jenkins, GitHub, Kubernetes)
  • Proficiency in network protocols (TCP/IP, DNS, HTTP) and IAM solutions (Okta, Azure AD)
  • Hands-on experience with vulnerability management tools (Nessus, Metasploit)
  • Understanding of compliance frameworks (GDPR, HIPAA, PCI DSS)
  • Strong analytical and problem-solving abilities
  • Excellent communication skills with cross-functional teams
  • Proactive, detail-oriented, and thrives in a fast-paced environment
  • Bachelor's degree in Cybersecurity, IT, or a related field, or equivalent experience
  • 3+ years in SOC/security operations
Job Responsibility
Job Responsibility
  • Monitoring & Incident Response – Analyze security logs, investigate alerts, contain threats, and collaborate with MTDR vendors on SIEM configuration
  • Threat Intelligence & Hunting – Leverage threat intelligence feeds, proactively hunt for security risks, and apply MITRE ATT&CK methodologies
  • Network & Endpoint Security – Secure firewalls, IDS/IPS, VPNs, and manage EDR solutions to protect enterprise assets
  • Cloud & Application Security – Conduct security assessments, enforce best practices in AWS, Azure, and Google Cloud, and automate security measures within CI/CD pipelines
  • IAM & Data Security – Monitor identity and access management (IAM) systems, detect unauthorized access, and implement encryption and DLP policies
  • Compliance & Risk Management – Support audits for GDPR, HIPAA, and NIST compliance while performing internal security checks
  • Reporting & Communication – Generate detailed reports, collaborate with IT, development, and management teams, and contribute to security awareness initiatives
What we offer
What we offer
  • medical, vision, dental, and life and disability insurance
  • eligible to enroll in our company 401(k) plan
  • Fulltime
Read More
Arrow Right

Cyber Security Soc Analyst

The SOC Analyst (L1/L2) and Lead are responsible for proactive monitoring, detec...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong knowledge of SIEM platforms and alert investigation
  • Advanced incident response, malware analysis, and RCA expertise
  • Deep knowledge of endpoint and network security tools
  • Threat hunting and forensic investigation capabilities
  • Familiarity with vulnerability management and DLP/email security
  • Experience with threat intelligence platforms and TTP mapping
  • Strong analytical, communication, and documentation skills
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
Job Responsibility
Job Responsibility
  • Proactive monitoring, detection, investigation, and response to security threats using industry-leading solutions
  • Guide and architect SOC workflows and systems to ensure robust organizational security
  • Threat hunting and forensic investigation
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
  • Use, configure, and optimize SIEM tools (Splunk, IBM QRadar, Microsoft Sentinel, LogRhythm, ArcSight, Elastic SIEM) for threat identification and alert management
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Leadership and team management
What we offer
What we offer
  • Inclusive and respectful work environment
  • Positions open to people with disabilities
  • Fulltime
Read More
Arrow Right

SOC Level 1 Analyst

Inetum is a European leader in digital services. Inetum’s team of 28,000 consult...
Location
Location
Portugal , Lisbon
Salary
Salary:
Not provided
https://www.inetum.com Logo
Inetum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 1/2 years of experience as a SOC level 1 analyst or similar
  • Experience with MS Windows Azure
  • Strong knowledge of IP networks - Internet Protocol (IPv4, IPv6)
  • Familiarity with DNS - Domain Name System
  • Knowledge of Sentinel is valuable
  • Analytical mindset and attention to detail
  • Enjoy working in a team, proactivity, and results orientation
  • Good level of English
  • Availability to work 24x7 shifts
Job Responsibility
Job Responsibility
  • Monitoring the SIEM platform and other systems that generate vulnerability alerts and security incident events
  • Periodic verification of sources that need to be managed and analysis of security events
  • Identification and notification of security alerts
  • Recording security incidents
  • Performing the first level of incident handling (assessment, triage, identification of actions to be taken, escalation, validation)
  • Verification of effective incident resolution
  • Fulltime
Read More
Arrow Right

Incident Response and SOC Analyst

The role supports the Cyber Security Operations Centre for the EU critical infra...
Location
Location
Belgium , Brussels
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong incident response methodology and hands-on experience in end-to-end incident handling in multinational settings
  • Advanced knowledge of XSOAR playbook creation and automation
  • Proficiency in designing and adapting automated workflows and enrichment
  • Python programming skills
  • Ability to present technical and business information effectively to diverse EC stakeholders
  • High standards for incident documentation, KPI reporting, and compliance with security frameworks
  • Familiarity with cloud-native services (AWS, Azure), EDR, SIEM-SOAR platforms, and container security
  • Excellent communication skills for working in multicultural teams and liaising with technical and non-technical audiences
  • Certifications or experience in relevant security technologies (e.g., Palo Alto Cortex XSOAR, Splunk, Microsoft SC-200, AWS Security Specialty)
  • Level 6 European Qualification Framework (Bachelor's degree or higher) for senior profiles
Job Responsibility
Job Responsibility
  • Define incident handling procedures, automation requirements, and playbook logic aligned with the needs
  • Prepare incident response workflows, automated enrichment steps, and technical documentation for standardized alert handling
  • Handle cybersecurity incidents from detection through escalation, containment, and resolution
  • Develop and maintain XSOAR playbooks, integrations, and automations across platforms such as Splunk, AWS, Azure Sentinel, Carbon Black Cloud, and Sysdig
  • Coordinate and review playbook updates, incident reports, and cross-team collaboration
  • Report key performance metrics, including FPTP rate, MTTH, escalation rate, automation coverage, time saved, and error reductions
  • Assist training analysts on playbook usage and incident response methods
  • Collaborate with CSIRC, CATCH analysts, infrastructure teams, and external stakeholders to validate playbook coverage and share threat intelligence.
What we offer
What we offer
  • Mobility options (including a company car)
  • Insurance coverage
  • Meal vouchers
  • Eco-cheques
  • Continuous learning opportunities through the Sopra Steria Academy
  • Participation in team events.
  • Fulltime
Read More
Arrow Right

SOC Cyber Fraud Analyst

The Security Operations Center Cyber Fraud Analyst is an intermediate level posi...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3-5 years of relevant experience in Cyber Fraud or SOC
  • Ability to communicate effectively both orally and in writing
  • Strong knowledge of current Cyber Fraud trends including common Account Takeover techniques and banking malware
  • Deep understanding of Intrusion Detection analysis (TCP/IP, packet level analysis) as well as Application Layer Protocols (HTTP)
  • Advanced understanding of various operating systems (Windows/UNIX), and web technologies (focusing on Internet security)
  • Knowledge of cutting-edge threats and technologies affecting Web Applications
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills
  • Bachelor’s degree/University degree or equivalent experience
Job Responsibility
Job Responsibility
  • Perform monitoring, research, assessment and analysis of Digital Fraud Attacks leveraging various Security Event Monitoring platforms
  • Follow pre-defined actions to handle BAU and high severity issues including escalating to other support groups
  • Execute daily ad hoc tasks or lead small projects as needed
  • Create and maintain operational reports for Key Performance Indicators and weekly and monthly metrics
  • Perform assessment as well as troubleshooting to help isolate technical issues with the integration of fraud monitoring technologies
  • Participate in daily and ad hoc conference calls to manage quality assurance and documentation related tasks
  • Identify areas for tuning use cases to enhance monitoring value
  • Engage with Fraud Policy, Operations, Strategy and other teams for early detection, prevention and mitigation of detected fraudulent activities
  • Fulltime
Read More
Arrow Right

AVP - SOC Cyber Fraud Analyst

The Security Operations Center Cyber Fraud Analyst is an intermediate level posi...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Ability to communicate effectively both orally and in writing
  • Strong knowledge of current Cyber Fraud trends including common Account Takeover techniques and banking malware
  • Deep understanding of Intrusion Detection analysis (TCP/IP, packet level analysis) as well as Application Layer Protocols (HTTP)
  • Advanced understanding of various operating systems (Windows/UNIX), and web technologies (focusing on Internet security)
  • Knowledge of cutting-edge threats and technologies affecting Web Applications
  • Experience with Big Data Technologies, ETL Tools, Data Warehouse and Business Intelligence technologies is preferred
  • Experience with any scripting language and Splunk is a plus
  • Experience with vulnerability assessment as well as penetration testing or forensic analysis fields is a plus
  • Certifications from EC-Council, GIAC, (ISC)² are preferred [CISSP, CEH, GCIA, GWAPT and CFE]
  • 5-8 years of relevant experience in Cyber Fraud or SOC
Job Responsibility
Job Responsibility
  • The analyst performs monitoring, research, assessment and analysis of Digital Fraud Attacks leveraging various Security Event Monitoring platforms including Web Threat Detection, Real Time Fraud Risk Assessment, Big Data and Digital Application Monitoring tools (Splunk, SAS, Teradata, and enterprise real time fraud detection tools)
  • Follow pre-defined actions to handle BAU and high severity issues including escalating to other support groups
  • Execute daily ad hoc tasks or lead small projects as needed
  • Create and maintain operational reports for Key Performance Indicators and weekly and monthly metrics
  • Perform assessment as well as troubleshooting to help isolate technical issues with the integration of fraud monitoring technologies
  • Participate in daily and ad hoc conference calls to manage quality assurance and documentation related tasks
  • Identify areas for tuning use cases to enhance monitoring value
  • Engage with Fraud Policy, Operations, Strategy and other teams for early detection, prevention and mitigation of detected fraudulent activities
  • Fulltime
Read More
Arrow Right