Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
WORKING HOURS: Wednesday – Saturday 9am – 8pm EST
Working for an IT Consultancy that specialises in Cybersecurity & Cloud Services. They are looking for a Security analyst who will perform initial triage on alerts generated by Palo Alto XDR/XSIAM, SentinelOne, Splunk, Microsoft Defender, and other supported technologies, escalating cases to customers and senior personnel as necessary. Responsibilities include enrichment of security events, documenting incident details, executing playbooks/runbooks, supporting detection tuning activities, and contributing to continuous improvement across the SOC.
This role is remote, shift-based, and operates within their “One Team One SOC” model, ensuring
consistent, high-quality service delivery across all customers.
Required Skills:
Bachelors Degree in Computer Science, Security OR Similar
Technical
- Basic understanding of cybersecurity fundamentals
- Familiarity with SIEM or EDR platforms (e.g., Palo Alto XSIAM/XDR, Splunk, SentinelOne, Microsoft Defender)
- Ability to perform alert triage, event correlation, and basic investigative steps
- Understanding of Windows and Linux operating system logs and basic administration
- Knowledge of basic networking concepts (TCP/IP, DNS, VPN, firewalls)
- Basic familiarity with cloud environments (Azure, O365 security signals preferred)
- Ability to follow incident response playbooks and properly document findings
Operational
- Strong written communication skills for reporting and case documentation
- Ability to work flexible shift schedules and operate in a fast-paced 24/7 SOC environment
- Comfortable working independently while collaborating closely with senior analysts and leads
- Strong attention to detail and ability to follow standardized procedures
Key Skills
Ranked by relevanceReady to apply?
Join Teqconnect and take your career to the next level!
Application takes less than 5 minutes

