SOC 2 - Security Analyst

Overview

Hybrid
$40 - $45
Contract - Independent
Contract - W2
Contract - 6 Month(s)
No Travel Required

Skills

Network Security
SOC 2
security incidents
SOC
threat intelligence
MITRE ATT&CK
Azure
AWS
GCP
SIEM
scripting
security orchestration
DS/IPS

Job Details

Job Title: SOC 2 - Security Analyst Projected Start Date: 10-27-2025 Projected End Date: 04-24-2026 Position Type: Contract Location: Seattle, WA Remote Work: Partial

Primary Skills: Network Security


Job Description
Role Description Junior Security Analyst


Outline of the Role:

We are looking to hire a dynamic Junior Security Analyst to monitor technology systems for security incidents, review incident data and support the development of risk mitigation strategies and more. The Junior-level Security Analyst is expected to have 2-5 years of experience.

A day in the life:
The Cyber Security Analyst will help the team to perform Security Operations Center (SOC) duties, which include incident response, malware analysis, and monitoring. This role will work with the team to implement processes and practices designed to protect networks, devices, and data from malicious attack, damage, or unauthorized access.
Triages alerts/incidents and performs deep analysis; correlates with threat intelligence tools, tactics and procedures (TTP) in indicators of compromise (IOCs) to identify the threat actor, nature of the attack, and systems or data affected.
Prioritizes and triages alerts or issues to determine whether a real security incident is taking place and escalate incidents to Tier 3 if remediation cannot be closed within SLA time.
Performs analysis, triage and remediation of low/medium priority alerts.
Analyzing logs, network traffic, and other data sources to identify the source of incidents.
Record identified vulnerabilities, create remediation tickets and track their status.
Build internal scripts, tools, and automation processes to enhance detection and response capabilities.
Adjusting security tools and processes, e.g. EDR alerting modifications, updating detection rules conditions, etc.


Qualifications, Skills, Experience and Personal Requirements:
Bachelor s in: Computer Science, Information Security, Cybersecurity, or a related degree.
2-4 year experience in one or more areas: Security Operations, Incident Response
Strong security concepts of threat categories (such as malware, phishing attacks, Defense-in-Depth, MITRE ATT&CK framework, etc.)
Strong knowledge of M365 Security tools, Azure, AWS, Google Cloud Platform
Working experiences to security tools such as SIEM (Sentinel, Splunk, Elastic etc.), EDR, firewalls, IDS/IPS, anti-spam, content management, server and network device hardening, etc.
Strong knowledge of Windows, Linux and/or Mac OS and comfortable with looking at, understanding, and investigating Security Event logs.
Good knowledge of networking protocols (SMTP, HTTP, HTTPS, FTP, DNS, DHCP, etc).
Experiences of any query language and scripting language
SharePoint, Excel, JIRA and/or Microsoft Office skills
Experience in using security orchestration, automation, and response tools
Experience with query languages and scripting languages
Experience in using security orchestration, automation, and response tools

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.