Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Position Overview
- We are seeking a highly motivated Security Operations Center (SOC) Analyst to monitor, analyze, and respond to cybersecurity threats across enterprise systems and networks.
- The SOC Analyst will play a critical role in identifying security incidents, conducting investigations, and supporting incident response activities in a 24/7 security operations environment.
- The ideal candidate has hands-on experience with SIEM tools, threat detection, and incident handling, and is comfortable working in a fully remote setting within the United States.
Key Responsibilities
1. Security Monitoring & Detection
- Monitor security alerts and events using SIEM platforms (Splunk, Sentinel, QRadar, LogRhythm, etc.).
- Analyze logs from firewalls, IDS/IPS, EDR, servers, cloud platforms, and endpoints.
- Identify, triage, and prioritize security alerts based on severity and impact.
2. Incident Response & Investigation
- Investigate security incidents including phishing, malware, ransomware, account compromise, and insider threats.
- Perform root cause analysis and determine scope, impact, and remediation steps.
- Escalate incidents according to incident response procedures and SLAs.
- Assist in containment, eradication, and recovery activities.
3. Threat Intelligence & Hunting
- Utilize threat intelligence feeds and frameworks (MITRE ATT&CK) to enhance detection.
- Conduct proactive threat hunting to identify hidden or emerging threats.
- Stay current with new vulnerabilities, attack techniques, and threat actor behavior.
4. Documentation & Reporting
- Document incidents, findings, and response actions clearly and accurately.
- Prepare incident reports and metrics for internal stakeholders.
- Support compliance and audit requirements (SOC 2, ISO 27001, NIST, HIPAA, PCI-DSS).
5. Tooling & Process Improvement
- Tune SIEM rules and alerts to reduce false positives.
- Support integration of new security tools and log sources.
- Participate in SOC playbook creation and continuous improvement initiatives.
6. Collaboration & Communication
- Work closely with Incident Response, IT, Cloud, and DevOps teams.
- Communicate effectively during active incidents and post-incident reviews.
- Participate in shift handovers and on-call rotations as required.
Required Skills & Qualifications
Technical Skills
- 2–5+ years of experience in a SOC, security operations, or cybersecurity role.
- Hands-on experience with SIEM platforms (Splunk, Microsoft Sentinel, QRadar, etc.).
- Familiarity with EDR/XDR tools (CrowdStrike, SentinelOne, Defender, etc.).
- Strong understanding of networking fundamentals (TCP/IP, DNS, HTTP, VPNs).
- Experience analyzing logs from Windows, Linux, cloud platforms (AWS/Azure/GCP).
- Knowledge of malware analysis, phishing investigation, and threat detection techniques.
Security Frameworks & Standards
- Familiarity with MITRE ATT&CK, NIST CSF, and incident response frameworks.
- Understanding of common compliance standards (SOC 2, ISO 27001, HIPAA, PCI-DSS).
Key Skills
Ranked by relevanceReady to apply?
Join iConsultera and take your career to the next level!
Application takes less than 5 minutes

