Security Operations Center (SOC) Analyst

• Posted 5 hours ago • Updated 5 minutes ago
Full Time
Part Time
Fitment

Dice Job Match Score™

🔢 Crunching numbers...

Job Details

Skills

Summary

Role : Security Operations Center (SOC) Analyst

Location :- Dallas,TX (OR) Virginia Beach, VA (Onsite)

Job type :- C2C or W2

Role Overview

Seeking a hands-on SOC Analyst to provide immediate operational support and free up internal security staff. This role focuses on real-time monitoring, triage, and response to security alerts across endpoint protection, phishing incidents, and email security tools.

Primary responsibility includes working with:

  • SentinelOne (EDR/XDR alerts)
  • Microsoft Defender (Email, Endpoint, Identity alerts)
  • Security Operations Center (SOC) Analyst
    Phishing reports from end-users

Key Responsibilities

1. Security Alert Monitoring & Triage

  • Monitor and triage alerts from:
    • SentinelOne (malware, suspicious activity, behavioral alerts)
    • Microsoft Defender (Defender for Endpoint, Defender for Office 365)
  • Perform initial investigation and classification:
    • True Positive / False Positive
    • Severity and impact assessment
  • Escalate complex incidents to internal teams

2. Phishing Incident Response

  • Analyze phishing reports submitted by users:
    • Email headers, URLs, attachments
  • Take appropriate response actions:
    • Block sender/domain
    • Quarantine emails
    • Trigger user awareness notifications
  • Coordinate with email security policies in Defender

3. Incident Response

Focus

  • Alert triage and ticket creation
  • Basic containment actions (isolate endpoint, block indicators)
  • Run predefined playbooks
  • Deep-dive investigation of incidents
  • Endpoint forensics (via SentinelOne)
  • Correlate alerts across tools
  • Execute remediation actions (kill processes, isolate machines)

4. Ticketing & Documentation

  • Create and update incident tickets (ServiceNow/JIRA or equivalent)
  • Maintain clear investigation notes and evidence
  • Ensure SLA adherence for response and resolution

5. Threat Detection & Improvement

  • Identify recurring patterns and suggest tuning
  • Reduce false positives via rule optimization
  • Contribute to improving SOC playbooks and runbooks

Required Skills & Qualifications

Core Technical Skills

  • Hands-on experience with:
    • SentinelOne (EDR/XDR investigation)
    • Microsoft Defender (Endpoint + Email Security)
  • Strong understanding of:
    • Phishing detection and analysis
    • Malware behavior and indicators of compromise (IOCs)
    • Email security (SPF, DKIM, DMARC basics)
  • Familiarity with SIEM/SOAR tools (nice to have)

Preferred Skills

  • Experience with:
    • Microsoft Defender for Office 365
    • Threat Intelligence platforms
  • Basic scripting (PowerShell/Python) for investigation
  • Understanding of MITRE ATT&CK framework

Soft Skills

  • Strong analytical thinking
  • Clear communication (written & verbal)
  • Ability to work in fast-paced SOC environment
  • High attention to detail

Certifications (Preferred)

  • Security+
  • CySA+ / CEH
  • Microsoft Security Operations Analyst (SC-200)

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 91112461
  • Position Id: OOJ - 3387-2388-1778190398
  • Posted 5 hours ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Dallas, Texas

Today

Contract, Third Party

Depends on Experience

Frisco, Texas

Today

Full-time

Compensation information provided in the description

Dallas, Texas

9d ago

Easy Apply

Contract

Depends on Experience

Dallas, Texas

9d ago

Easy Apply

Contract

Depends on Experience

Search all similar jobs