Enable job alerts via email!

SOC Analyst (Tier 1/2/3) _ Remote (USA) _ Contract & Fulltime FTE at Acestack Jersey City, NJ

Itlearn360

Jersey City (NJ)

Remote

USD 70,000 - 120,000

Full time

2 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

A leading tech company is seeking a SOC Analyst (Tier 1/2/3) to join their remote cybersecurity team. The role involves monitoring security alerts, conducting incident analysis, and utilizing various security tools like Splunk and QRadar. The ideal candidate will have strong analytical skills and experience in threat intelligence, making a significant impact in a fast-paced environment. This role requires a passion for cybersecurity and an ability to document incidents clearly.

Qualifications

  • 3-10+ years of experience in a SOC environment.
  • Experience with SIEM tools is essential.
  • Strong knowledge of cyber threats and incident response.

Responsibilities

  • Monitor and triage security alerts from SIEM tools.
  • Conduct real-time incident detection and analysis.
  • Maintain incident response runbooks and documentation.

Skills

Analytical Skills
Cybersecurity Operations
Threat Intelligence
Log Analysis
Incident Triage
Communication Skills

Tools

Splunk
QRadar
CrowdStrike

Job description

SOC Analyst (Tier 1/2/3) ___ Remote (USA) ___ Contract & Fulltime FTE job at Acestack. Jersey City, NJ. SOC Analyst (Tier 1/2/3)

Location: Remote USA
Type: Contract / Full-Time


Experience: 3-10+ Years

Job Description: We are looking for a skilled SOC Analyst (Tier 1/2/3) to detect, investigate, and respond to security incidents in a 24x7 environment. The candidate should have strong analytical skills and a passion for cybersecurity operations and threat intelligence.

Key Responsibilities:

  • Monitor and triage security alerts from SIEM tools

  • Conduct real-time incident detection, analysis, and escalation

  • Perform log analysis, threat hunting, and root cause analysis

  • Support vulnerability management and endpoint detection

  • Maintain incident response runbooks and documentation

Must Have Skills:

  • Experience with tools like Splunk, QRadar, CrowdStrike, etc.

  • Strong knowledge of cyber threats, MITRE ATT&CK, kill chain

  • Familiarity with network traffic analysis and malware behavior

  • Excellent communication and incident documentation skills

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.