Senior SOC Analyst (Remote)

Insight Global • United State
Remote
This Job is No Longer Active This position is no longer accepting applications
AI Summary

Join Insight Global's tight-knit Security Operations Center team as a Senior SOC Analyst. This role involves responding to security incidents, configuring security agents, and collaborating with colleagues. Experience in MSSP and SOC environments is required.

Key Highlights
Respond to security incidents and escalate Tier 1/Tier 2 tickets
Configure security agents, troubleshoot, and report security issues
Collaborate with colleagues in Security and IT
Experience in MSSP and SOC environments required
Technical Skills Required
SIEM (SumoLogic, Splunk) Endpoint Detection and Response Tools Application Whitelisting Endpoint and Network Monitoring Microsoft Defender EDR or XDR Powershell Python Azure
Benefits & Perks
Remote work
Medical, dental, and vision insurance
HSA, FSA, and DCFSA account options
401k retirement account access with employer matching
Paid sick leave and/or other paid time off

Job Description


Our client is looking for a SOC Analyst to sit fully remote in the US. This analyst will be reporting to the Manager of the Security Operations Center and will be joining the larger Information Security team. 25% of their day will be responding, reviewing, and escalating Tier 1/Tier 2 tickets in Service Now. Another 25% of their day will be spent configuring security agents, troubleshooting, and reporting any and all activities related to security issues that occur during their shift. Examples of tools this role utilizes to troubleshoot include: SIEM, Endpoint Detection and Response Tools, Application Whitelisting, and Endpoint and Network Monitoring. An additional 25% of their day is completing ad hoc IT Security tasks like Web Content Filtering, escalations from 3rd party MSSP File Monitoring, and support to end users. The final 25% of their day will be spent communicating and coordinating with colleagues in Security and IT. This team is tight knit, and they are looking for someone that they can bond with and get to know.



Required Skills & Experience


3+ years of experience in a MSSP (Managed Security Service Provider) role

Experience working in a SOC environment

Experience with Microsoft Defender EDR or XDR

SIEM platform experience preferably SumoLogic

Another ex. Splunk

Incident Response experience – full understanding of the incident response life cycle


Nice to Have Skills & Experience


Experience creating detection logic

Forensic knowledge

Familiarity with Active Directory

Scripting technologies (Powershell, Python)

Familiarity with cloud technologies (Azure)

Certificate in Networking or Security


$30/hr to $34/hr.

Exact compensation may vary based on several factors, including skills, experience, and education.

Benefit packages for this role will start on the 31st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law.


Subscribe our newsletter

New Things Will Always Update Regularly