Overview
Skills
Job Details
**CONTRACT TO POSSIBLE HIRE. FULLY REMOTE POSITION - CANDIDATES MUST RESIDE IN EASTERN TIME ZONE** **UNFORTUNATELY UNABLE TO SPONSOR OR WORK C2C**
The SOC Analyst will conduct initial triage and analysis on cybersecurity alerts and threats which have been detected, threat hunting activities to proactively identify vulnerabilities in company applications, systems and networks, investigate and work with IT Operations members to remediates security vulnerabilities and threats. This role ensures corporate security measures are effective in mitigating threats and risks and provides consultation on security issues to IT delivery team and local company IT support groups and administration of security tools.
Required Skills/Education
- Bachelor s degree in computer science, Information Security, or a related field (or equivalent work experience).
- 2+ years of experience in a SOC, cybersecurity, or related IT role.
- Strong understanding of cybersecurity concepts, including threat vectors, malware, ransomware, phishing, and DDoS attacks.
- Hands-on experience with SOC monitoring tools (e.g., SIEM platforms like Splunk, QRadar, or ArcSight).
- Familiarity with endpoint security, firewalls, IDS/IPS, and other security technologies.
- Strong analytical mindset with an ability to process large volumes of logs, alerts, and data effectively.
Desired Skills
- Industry certifications such as CompTIA Security+, CEH, CySA+, IA.
- Knowledge of scripting languages (e.g., Python, PowerShell, or Bash) for automation and analysis.
- Awareness of MITRE ATT&CK, NIST Cybersecurity Framework, or Kill Chain methodologies.
- Experience with cloud security monitoring for platforms like AWS, Azure, or Google Cloud Platform.
- Background in threat intelligence and malware analysis.
- Familiarity with packet analysis tools such as Wireshark or tcpdump.
- Experience with EDR tools such as Crowdstrike Falcon