Cybersecurity Triage Analyst/Remote

Remote • Posted 1 hour ago • Updated 1 hour ago
Contract Corp To Corp
Contract W2
Contract Independent
No Travel Required
Remote
Depends on Experience
Fitment

Dice Job Match Score™

🔗 Matching skills to job...

Job Details

Skills

  • Data Engineering & BI Lead (Azure + Databricks)

Summary

Job Title: Cybersecurity Triage Analyst

Location- Remote

Role Summary:

The Cybersecurity Triage Analyst is responsible for the initial review, classification, and prioritization of security alerts and incidents. This role acts as the first line of defense in a Security Operations Center (SOC), ensuring potential threats are quickly identified, assessed, and escalated when necessary.


Key Responsibilities:

  • Monitor security tools (SIEM, EDR, IDS/IPS) for alerts and suspicious activity
  • Perform initial triage and analysis of security events and incidents
  • Classify alerts based on severity, impact, and urgency
  • Investigate false positives and document findings
  • Escalate confirmed or high-risk incidents to senior analysts or incident response teams
  • Maintain accurate records of incidents, actions taken, and outcomes
  • Follow standard operating procedures (SOPs) and playbooks
  • Collaborate with other security and IT teams for incident resolution
  • Continuously improve triage processes and detection efficiency

Required Skills & Qualifications:

  • Basic understanding of cybersecurity concepts (network security, malware, phishing, etc.)
  • Familiarity with security tools like SIEM (e.g., Splunk, QRadar), EDR, firewalls
  • Knowledge of networking fundamentals (TCP/IP, DNS, HTTP)
  • Strong analytical and problem-solving skills
  • Ability to prioritize and handle multiple alerts simultaneously
  • Good written and verbal communication skills
  • Attention to detail and documentation discipline

Preferred Qualifications:

  • Bachelor’s degree in Cybersecurity, IT, or related field
  • Certifications such as CompTIA Security+, CEH, or similar
  • Internship or prior experience in SOC or IT support
  • Understanding of threat intelligence and MITRE ATT&CK framework

Key Metrics / KPIs:

  • Alert response time
  • Accuracy of triage (false positive vs. true positive rate)
  • Incident escalation quality
  • Documentation completeness
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 10513292
  • Position Id: 72095-12895-
  • Posted 1 hour ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Remote

Yesterday

Contract

75 - 110

Remote or Hybrid in San Francisco, California

4d ago

Easy Apply

Contract

$60,000 - $70,000

Remote or Hybrid in Los Angeles, California

3d ago

Easy Apply

Contract

$60,000 - $70,000

Remote or Hybrid in Dallas City, Illinois

Yesterday

Easy Apply

Contract

$60,000 - $70,000

Search all similar jobs