Position Overview:
As a SOC Analyst at viLogics, you will operate within the Total Secure Office 365 (TSO 365) framework, our fully managed cybersecurity and IT services platform. In this MSSP environment, you will collaborate with elite engineers to deliver threat detection, incident response, and risk mitigation for clients across various industries including healthcare, education, manufacturing, and government.
This role demands strong analytical skills, teamwork, and operational fluency in cloud, hybrid, and on-prem environments. You will support viLogics' proprietary FastTrack Cybersecurity Model, which includes MDR/XDR, SIEM, SASE, PAM, and secure backup platforms.
Core Responsibilities:
Security Monitoring & Threat Detection
- Monitor endpoints, servers, SaaS platforms (e.g., M365), and cloud workloads via viLogics' MDR/XDR platform.
- Analyze events from SIEM/SOAR environment and escalate based on criticality.
- Use threat intelligence feeds, MITRE ATT&CK, and behavioral analytics to identify advanced threats.
Incident Triage & Response
- Lead real-time response to security events using viLogics' TSO tools and playbooks.
- Document incident reports, impact assessments, and mitigation strategies; coordinate with client IT teams or helpdesk.
- Participate in post-incident reviews to improve response playbooks.
Operational Excellence & Automation
- Adjust detection rules and alert thresholds according to client risk profiles and compliance standards (HIPAA, CMMC, PCI).
- Suggest improvements for automated containment workflows.
- Assist with purple team exercises and tabletop simulations.
Client-Facing Collaboration
- Participate in monthly client briefings on threats, trends, and security posture.
- Translate technical findings into executive summaries for clients and audits.
- Provide risk prioritization leveraging viLogics' tools.
Toolsets You Will Work With:
- SIEM/SOAR: viLogics Internal SIEM/SOAR, Microsoft Sentinel, Splunk, LogRhythm, Cortex XSOAR
- EDR/XDR/MDR: viLogics EDR, SentinelOne, Defender for Endpoint, Huntress, CrowdStrike
- IAM/PAM: ThreatLocker, Microsoft Entra ID, Duo
- Network Security: DNS Filtering, ZTNA, SASE Netskope, Prisma Access
- Backup & DR: Veeam, Zerto, Rubrik, Air-Gap Storage
- Compliance: CISv8, NIST 800-171, HIPAA, CMMC 2.0, PCI-DSS
Required Qualifications:
- At least 3 years in a SOC, MSSP, or threat analyst role
- Strong understanding of TCP/IP, DNS, HTTP/S, and log analysis
- Familiarity with MITRE ATT&CK, threat intelligence, and TTP correlation
- Hands-on experience with SIEM, EDR/XDR, and protection tools
- Solid knowledge of Microsoft 365 workloads including Defender for Office, Teams, OneDrive, SharePoint
Certifications:
- CompTIA Security+ or CySA+
- Microsoft SC-200
- GIAC GCDA
- EC-Council CSA / CEH
- Kaseya One
- SentinelOne or CrowdStrike certifications
What Sets This Role Apart:
Work inside a Tier-3 SOC 2 Certified Data Center. Help clients qualify for $1.5M+ cybersecurity insurance. Operate within a Zero Trust Architecture environment with integrated SASE, SD-WAN, and PAM. Be part of a team blending ITIL service delivery with cyber warfare-level response protocols.
Career Pathways:
- Tier 2 / Tier 3 SOC Analyst
- Cyber Threat Hunter
- vCISO or Compliance Officer
- DFIR Specialist or Security Engineer
- TSO 365 Platform Architect
Work Environment:
- Fully remote with optional travel to client sites or viLogics Data Centers.
- Rotational 24/7 shifts with premiums for overnight/weekend work.
- Fast-paced, collaborative team focused on impactful security improvements.