Enable job alerts via email!

Security Operations Center (SOC) Analyst

ZipRecruiter

Ebensburg (Cambria County)

Remote

USD 80,000 - 110,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

A leading company seeks a SOC Analyst to enhance cybersecurity measures across various industries. In this fully remote role, you will collaborate with experts to deliver threat detection and incident response while supporting cutting-edge security technologies. Join a dynamic team and contribute to impactful security improvements.

Qualifications

  • At least 3 years in a SOC, MSSP, or threat analyst role.
  • Strong understanding of TCP/IP, DNS, HTTP/S, and log analysis.
  • Hands-on experience with SIEM, EDR/XDR, and protection tools.

Responsibilities

  • Monitor endpoints and servers for threats using MDR/XDR platform.
  • Lead real-time response to security events and document incidents.
  • Adjust detection rules according to client risk profiles.

Skills

Analytical skills
Teamwork
Operational fluency in cloud environments

Education

CompTIA Security+ or CySA+ certification
Microsoft SC-200
GIAC GCDA
EC-Council CSA / CEH

Tools

SIEM
EDR
XDR
Microsoft 365 workloads

Job description

Position Overview:

As a SOC Analyst at viLogics, you will operate within the Total Secure Office 365 (TSO 365) framework, our fully managed cybersecurity and IT services platform. In this MSSP environment, you will collaborate with elite engineers to deliver threat detection, incident response, and risk mitigation for clients across various industries including healthcare, education, manufacturing, and government.

This role demands strong analytical skills, teamwork, and operational fluency in cloud, hybrid, and on-prem environments. You will support viLogics' proprietary FastTrack Cybersecurity Model, which includes MDR/XDR, SIEM, SASE, PAM, and secure backup platforms.

Core Responsibilities:

Security Monitoring & Threat Detection

  • Monitor endpoints, servers, SaaS platforms (e.g., M365), and cloud workloads via viLogics' MDR/XDR platform.
  • Analyze events from SIEM/SOAR environment and escalate based on criticality.
  • Use threat intelligence feeds, MITRE ATT&CK, and behavioral analytics to identify advanced threats.

Incident Triage & Response

  • Lead real-time response to security events using viLogics' TSO tools and playbooks.
  • Document incident reports, impact assessments, and mitigation strategies; coordinate with client IT teams or helpdesk.
  • Participate in post-incident reviews to improve response playbooks.

Operational Excellence & Automation

  • Adjust detection rules and alert thresholds according to client risk profiles and compliance standards (HIPAA, CMMC, PCI).
  • Suggest improvements for automated containment workflows.
  • Assist with purple team exercises and tabletop simulations.

Client-Facing Collaboration

  • Participate in monthly client briefings on threats, trends, and security posture.
  • Translate technical findings into executive summaries for clients and audits.
  • Provide risk prioritization leveraging viLogics' tools.

Toolsets You Will Work With:

  • SIEM/SOAR: viLogics Internal SIEM/SOAR, Microsoft Sentinel, Splunk, LogRhythm, Cortex XSOAR
  • EDR/XDR/MDR: viLogics EDR, SentinelOne, Defender for Endpoint, Huntress, CrowdStrike
  • IAM/PAM: ThreatLocker, Microsoft Entra ID, Duo
  • Network Security: DNS Filtering, ZTNA, SASE Netskope, Prisma Access
  • Backup & DR: Veeam, Zerto, Rubrik, Air-Gap Storage
  • Compliance: CISv8, NIST 800-171, HIPAA, CMMC 2.0, PCI-DSS

Required Qualifications:

  • At least 3 years in a SOC, MSSP, or threat analyst role
  • Strong understanding of TCP/IP, DNS, HTTP/S, and log analysis
  • Familiarity with MITRE ATT&CK, threat intelligence, and TTP correlation
  • Hands-on experience with SIEM, EDR/XDR, and protection tools
  • Solid knowledge of Microsoft 365 workloads including Defender for Office, Teams, OneDrive, SharePoint

Certifications:

  • CompTIA Security+ or CySA+
  • Microsoft SC-200
  • GIAC GCDA
  • EC-Council CSA / CEH
  • Kaseya One
  • SentinelOne or CrowdStrike certifications

What Sets This Role Apart:

Work inside a Tier-3 SOC 2 Certified Data Center. Help clients qualify for $1.5M+ cybersecurity insurance. Operate within a Zero Trust Architecture environment with integrated SASE, SD-WAN, and PAM. Be part of a team blending ITIL service delivery with cyber warfare-level response protocols.

Career Pathways:

  • Tier 2 / Tier 3 SOC Analyst
  • Cyber Threat Hunter
  • vCISO or Compliance Officer
  • DFIR Specialist or Security Engineer
  • TSO 365 Platform Architect

Work Environment:

  • Fully remote with optional travel to client sites or viLogics Data Centers.
  • Rotational 24/7 shifts with premiums for overnight/weekend work.
  • Fast-paced, collaborative team focused on impactful security improvements.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.