SOC Analyst (LOCATIONS: North Carolina, Upstate Albany and California)

Hybrid in Fresno, CA, US • Posted 30+ days ago • Updated 3 hours ago
Full Time
Occasional Travel Required
Hybrid
Depends on Experience
Company Branding Image
Fitment

Dice Job Match Score™

🛠️ Calibrating flux capacitors...

Job Details

Skills

  • SOC Analyst
  • security
  • SIEM
  • EDR
  • MSSP
  • Incident Response
  • scripting
  • automation
  • Microsoft 365

Summary

LOCATIONS: Must currently reside in one of the following areas - North Carolina, Upstate Albany and California

NO SPONSORSHIP AVAILABLE, NO 3RD PARTIES PLEASE

SOC Analyst

Direct hire role. Preferably based in one of the following areas: Fresno / Albany / Charlotte, but strong candidates from other locations will be considered for fully remote. No 3rd parties please, no sponsorship.

Summary

The SOC Analyst monitors and triages security alerts across endpoint, identity, email, network, and cloud telemetry. This role is responsible for accurate alert investigation, timely escalation, and thorough documentation of actions taken and results observed. The SOC Analyst works within defined playbooks while contributing to detection quality improvements through feedback, tuning recommendations, and identification of recurring gaps.

Responsibilities

  • Monitor SIEM/EDR and related security tooling for alerts, anomalies, and indicators requiring investigation.
  • Perform alert triage: validate signal quality, identify affected entities, assess scope, and determine next steps per playbooks.
  • Investigate endpoint and identity activity (Windows/macOS, Entra ID/Azure AD, Microsoft 365) and correlate with network/email telemetry as available.
  • Execute initial containment actions when authorized (e.g., isolate host, disable account, revoke sessions/tokens) following documented procedures and approval gates.
  • Escalate suspected incidents to incident response resources with clear summaries, supporting artifacts, and recommended next actions.
  • Maintain complete case notes and evidence references: sources reviewed, queries executed, timestamps, and observed results.
  • Support client communications through status updates aligned to SLAs and internal escalation standards.
  • Assist with detection engineering feedback loops: identify false positives, propose tuning, and document root causes of noisy alerting.
  • Contribute to knowledge base/playbook maintenance: update procedures based on outcomes, new detections, and tooling changes.
  • Participate in shift handoffs using standardized formats to maintain continuity and accountability.

Requirements

  • 2+ years of experience in a SOC, MSSP, IR support, or security analyst role (or equivalent demonstrated experience).
  • Familiarity with alert triage workflows and ticketing/case management (e.g., Jira, ServiceNow, Halo, etc.).
  • Working knowledge of common log sources and telemetry: EDR, Windows Event Logs, firewall/proxy, DNS, email security, cloud audit logs.
  • Comfort with investigative querying in at least one platform (SIEM, EDR, or log analytics tool) and ability to document queries and results.
  • Understanding of attacker tradecraft basics (MITRE ATT&CK concepts, common persistence and credential access patterns).
  • Strong written communication and documentation discipline; ability to produce clear incident notes without speculation.
  • United_States Citizen, based in one of the following areas:  North Carolina, Upstate Albany and California

Preferred

  • Experience with one or more of: Microsoft Sentinel, Splunk, Elastic, QRadar, CrowdStrike, Microsoft Defender for Endpoint, SentinelOne.
  • Microsoft 365 / Entra ID (Azure AD) investigation experience (sign-in risk, conditional access context, mailbox rules, OAuth app activity).
  • Basic scripting/automation familiarity (PowerShell, Python) for enrichment and repeatable triage steps.
  • Experience supporting managed security services with SLAs and defined escalation paths.

 

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 10492228
  • Position Id: 8898829
  • Posted 30+ days ago

Company Info

About Columbia Advisory Group

Columbia Advisory Group LLC (CAG) is a Dallas based, highly experienced Information Technology (IT) consulting firm founded in 2012.

We offer simple, meaningful, and practical solutions combined with straightforward analysis and recommendations. Our practice teams have experience in many regulatory and economic environments. CAG offers a deep understanding of IT, but our solutions are software and hardware agnostic.

Whether your organization is high-growth or economically challenged, Columbia Advisory Group can adapt to the complexities and nuances of your environment.

 

About_Company_OneAbout_Company_Two
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

No location provided

Today

Full-time

USD 100,000.00 - 110,000.00 per year

Remote or New Jersey

Today

Full-time

No location provided

Today

Full-time

Remote

Today

Full-time

Search all similar jobs