Enable job alerts via email!

Security Operations Center Analyst

DivIHN Integration

Chicago (IL)

Remote

USD 80,000 - 120,000

Full time

3 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading company in the cybersecurity sector is seeking a SOC Analyst for a remote position. This role involves proactive threat identification, incident response, and collaboration with global security teams. Candidates should have significant technical security experience and relevant certifications. The position offers an opportunity to work in a dynamic environment, focusing on advanced cybersecurity practices and mentoring junior staff.

Qualifications

  • Experience with SOC operations and tools.
  • Understanding of security policies and regulations.
  • Ability to influence security awareness.

Responsibilities

  • Identify adversary activities and discover threats.
  • Conduct incident response triage and mentor junior staff.
  • Communicate security incident details to stakeholders.

Skills

Log analysis
Network traffic analysis
MITRE attack framework
Incident response lifecycle
Cybersecurity best practices
Analytical skills
Problem-solving skills
Communication skills
Interpersonal skills
Project management skills

Education

Minimum of five years of technical security experience
CISSP certification
GCFA certification
GCIH certification
GCFE certification
Degree in Computer Science or related discipline

Tools

SIEM
SOAR
DFIR products
Microsoft Office

Job description

2 days ago Be among the first 25 applicants

Get AI-powered advice on this job and more exclusive features.

Direct message the job poster from DivIHN Integration

Sr Manager - Talent Acquisition (MSP Staffing | Account Management | Salesforce & CyberSecurity | Engineering Recruitment)

Title: SOC Analyst (Second Shift) - Remote

Location: Remote

Duration: 12 Months

Duties:
  • Proactively identify adversary activities in the network to discover threats before they cause harm.
  • Skills and experience in log analysis, network traffic analysis, and the MITRE attack framework are preferred.
  • Collaborate with the global IT security team and US SOC teams.
  • Perform duties in accordance with departmental guidelines, including real-time and historical analysis using security tools such as SIEM, Endpoint Protection, Firewalls, EDR, IDS, Email Gateway, Web Content Filtering, Network Detection & Response, and Identity Management.
  • Conduct incident response triage to assess suspected hosts and scope of attacks.
  • Review and mentor junior staff for quality and career development.
  • Stay updated on attacker tactics, techniques, and procedures to identify sophisticated threats.
  • Work with SOC, Intelligence, Incident Response, and Enterprise Security Teams for investigations and threat hunting.
  • Identify network visibility gaps and recommend improvements.
  • Develop and update playbooks, processes, and detection capabilities based on investigation feedback.
  • Coordinate escalation for advanced forensics, malware reverse-engineering, and host reviews to third-party vendors.
  • Communicate security incident details effectively to business stakeholders and non-technical audiences.
Skills:
  • Experience with SOC operations, scheduling, and tools including SIEM, SOAR, and DFIR products.
  • Understanding of incident response lifecycle and cybersecurity best practices.
  • Knowledge of security policies, regulations (e.g., SOX, privacy), and internal controls.
  • Ability to influence security awareness and adoption within the organization.
  • Strong analytical, problem-solving, communication, and interpersonal skills.
  • Project management skills for technical initiatives.
  • Proficiency with Microsoft Office and other relevant software.
  • Additional technologies may apply based on business needs.
  • Preferred: Insurance industry knowledge.
Education:
  • Minimum of five years of technical security experience across platforms, OS, software, and network protocols, or an equivalent combination.
  • Industry certifications such as CISSP, GCFA, GCIH, GCFE are preferred, or related discipline/experience in Computer Science.
Seniority level
  • Mid-Senior level
Employment type
  • Contract
Job function
  • Consulting, Human Resources, and Analyst
Industries
  • Insurance, IT Services and Consulting, Computer and Network Security
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Security Operations Center Analyst

360 SOC, Inc.

Remote

USD 60,000 - 100,000

17 days ago

Security Operations Center Analyst

TekStream Solutions

Atlanta

Remote

USD 80,000 - 100,000

30+ days ago

Security Operations Center Analyst

EPITEC

Chicago

On-site

USD 100,000 - 125,000

30+ days ago

Clinical Informatics Analyst - CI OPS Post Acute

Good Samaritan Society

Iowa

Remote

USD 80,000 - 100,000

16 days ago

Clinical Informatics Analyst - CI OPS Post Acute

Good Samaritan Society

Minnesota

Remote

USD 80,000 - 100,000

17 days ago

Clinical Informatics Analyst - CI OPS Post Acute

Good Samaritan Society

North Dakota

Remote

USD 80,000 - 100,000

17 days ago