Security Operations Center Analyst

Swoon United State
Remote
This Job is No Longer Active This position is no longer accepting applications

Job Description


Duration: 1 year

Pay: $50 - $60/hr (Depending on experience)

Location: 100% Remote (U.S.-based only) | 2nd Shift (Approx. 4PM–12:45AM CST)


About the Role:

We are supporting one of our clients in hiring an experienced SOC Level 3 Analyst to join a global IT security team operating on 2nd shift. This role focuses on proactively identifying and mitigating adversary activity within the network detecting threats before they can complete their mission.


What You’ll Do:

  • Perform proactive threat hunting and real-time analysis across multiple security platforms, including SIEM, EDR, IDS/IPS, Firewalls, and NDR tools.
  • Conduct incident response triage to assess suspected attacks and determine their scope and impact.
  • Review and validate analysis from junior SOC staff for accuracy and completeness.
  • Mentor junior analysts to support career growth and skill development.
  • Stay current on attacker tactics, techniques, and procedures (TTPs) to enhance detection capabilities.
  • Collaborate with SOC, Threat Intelligence, and Incident Response teams during investigations and hunt missions.
  • Identify visibility gaps in network and endpoint coverage; recommend solutions for improvement.
  • Develop, maintain, and refine playbooks, detection rules, and processes based on investigative findings.
  • Coordinate advanced forensic analysis or malware reverse-engineering tasks with third-party vendors as needed.
  • Clearly communicate security incident details to technical and non-technical stakeholders.


What We’re Looking For:

  • Minimum 5 years of hands-on experience in cybersecurity operations, threat hunting, or incident response.
  • Strong understanding of SOC operations, SIEM/SOAR tools, and DFIR processes.
  • Expertise in analyzing network traffic, endpoint activity, and security logs.
  • Knowledge of the MITRE ATT&CK framework and common attacker techniques.
  • Familiarity with compliance and regulatory frameworks (e.g., SOX, privacy laws).
  • Excellent analytical, problem-solving, and communication skills.
  • Proven ability to influence change and enhance organizational security posture.
  • Experience mentoring or reviewing work of junior analysts.
  • Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience).
  • Preferred certifications: CISSP, GCFA, GCIH, GCFE, or equivalent.
  • Experience in the insurance or financial services industry is a plus.


Similar Jobs

Explore other opportunities that match your interests

Senior Security Engineer - Enterprise Security

Cyber Security
1h ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

Samsara

United State

Cybersecurity Engineer (EDR)

Cyber Security
14h ago
Visa Sponsorship Relocation Remote
Job Type Contract
Experience Level Entry level

ConsultNet Technology Services...

United State

Principal Cyber Security Analyst - Digital Forensics

Cyber Security
14h ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

Fresenius Medical Care

United State

Subscribe our newsletter

New Things Will Always Update Regularly