Cybersecurity SOC Analyst (Mid-Level)

Overview

Remote
$59.94 - $60
Contract - W2
Contract - 12 Month(s)
10% Travel

Skills

Cybersecurity
SOC

Job Details

We are seeking a skilled and motivated SOC Analyst to join our growing cybersecurity operations team. As a SOC Analyst, you will play a critical role in identifying, analyzing, and responding to security threats that have been escalated from our Managed SOC Service Provider (MSSP). This is a hands-on technical role ideal for someone with a strong foundation in security monitoring and incident response who is ready to take on more complex investigations and contribute to the maturity of our SOC.

Key Responsibilities:
Alert Triage & Validation: Investigate and validate alerts escalated from our security partners using SIEM, EDR, and other security tools.
Incident Response: Execute containment and remediation steps for confirmed incidents. Escalate to Tier 3 when deeper forensic or threat hunting expertise is required.
Threat Analysis: Correlate data across multiple sources (network, endpoint, cloud) to identify patterns and indicators of compromise (IOCs).
Detection Tuning: Work with engineering and Tier 3 teams to fine-tune detection rules and reduce false positives.
Process Development: Document SOC workflows, procedures, and incident handling processes. Build and maintain runbooks to standardize response actions and improve operational efficiency.
Continuous Improvement: Stay current on emerging threats, vulnerabilities, and security technologies. Recommend improvements to detection and response capabilities.
Required Qualifications:
2+ years of experience in a SOC or cybersecurity operations role.
Experience with Microsoft Sentinel for SIEM and Microsoft Defender for Endpoint for EDR.
Solid understanding of TCP/IP, Windows/Linux OS internals, and common attack vectors.
Familiarity with MITRE ATT&CK, cyber kill chain, and threat modeling.
Strong analytical and problem-solving skills.
Excellent written and verbal communication skills.
Preferred Qualifications:
Security certifications such as Security+, CySA+, GCIH, GCIA, or equivalent.
Experience with scripting (Python, PowerShell) for automation and analysis.
Exposure to cloud security monitoring (Azure, AWS, Google Cloud Platform).
Understanding of compliance frameworks (e.g., NIST, ISO 27001, PCI-DSS).

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.