This role focuses on monitoring and responding to cyber threats across multiple environments for a global client base. It involves conducting threat analysis, forensic investigations, and remediation strategies in a fast-paced, remote setting. The position offers opportunities for career growth, skill development, and direct impact on organizational cybersecurity defenses.
Key Highlights
Technical Skills Required
Benefits & Perks
Job Description
This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Security Operations Analyst – East or Central Time Zone in the United States.
This role is centered on protecting organizations from cyber threats by monitoring, investigating, and responding to security incidents across multiple environments. You will be part of a dynamic, fully remote team focused on analyzing alerts, performing forensic investigations, and recommending remediation strategies. The position offers opportunities to work with advanced security tools, EDR platforms, and cloud environments while collaborating with experienced analysts. You will gain hands-on exposure to real-world threat scenarios and contribute to enhancing detection and response capabilities. This fast-paced and mission-driven environment allows for career growth, skill development, and direct impact on organizational cybersecurity. Your work ensures the protection of critical systems, endpoints, and data for a global client base.
- Accountabilities
- Triage, investigate, and respond to alerts from security platforms.
- Conduct forensic analysis of EDR telemetry, logs, and artifacts to determine the root cause of incidents.
- Perform malware analysis and evaluate suspicious activity across endpoints and cloud systems.
- Investigate and remediate anomalies within Microsoft 365 and other cloud environments.
- Support escalations from internal teams regarding threat-related inquiries.
- Contribute to detection engineering and tuning to improve SOC effectiveness.
- Collaborate in a mentored and knowledge-sharing team environment to enhance analyst capabilities.
- Requirements
- Minimum 2 years of experience in a Security Operations Center (SOC) or Digital Forensics (DFIR) role.
- Hands-on experience with Windows, Linux, and macOS operating systems.
- Familiarity with common attack techniques and tools (MITRE ATT&CK, PowerShell, lateral movement, persistence mechanisms, basic defense evasion).
- Knowledge of static and dynamic malware analysis methodologies.
- Working knowledge of Windows Administration, Active Directory, Group Policy, domain trusts, and core networking concepts (ports, protocols, NAT, VLANs).
- Understanding of web technologies and security concepts (web servers, applications, OWASP Top 10).
- Strong communication skills, with the ability to explain complex findings to non-technical audiences.
- Curiosity and dedication to continuous learning and professional growth.
- Preferred: experience in MSP/MSSP/MDR environments, scripting (Python, PowerShell, Bash, JavaScript, Ruby), cloud investigations (AWS, Azure, GCP), and participation in cybersecurity competitions or platforms (HackTheBox, TryHackMe).
- Benefits
- 100% remote work environment within the East or Central Time Zone.
- Competitive base salary ($100,000–$120,000) plus bonus and equity opportunities.
- Paid time off, vacation, sick days, and paid holidays.
- 12 weeks of paid parental leave.
- Comprehensive medical, dental, and vision plans.
- 401(k) with a 5% employer contribution.
- Life and disability insurance coverage.
- Stock options for full-time employees.
- Home office reimbursement ($500 one-time) and monthly $75 digital allowance.
- Education and professional development assistance, coaching via BetterUp platform.
When you apply, your profile goes through our AI-powered screening process designed to identify top talent efficiently and fairly.
🔍 Our AI evaluates your CV and LinkedIn profile thoroughly, analyzing your skills, experience, and achievements.
📊 It compares your profile to the job’s core requirements and past success factors to determine your match score.
🎯 Based on this analysis, we automatically shortlist the three candidates with the highest match to the role.
🧠 When necessary, our human team may perform an additional manual review to ensure no strong profile is missed.
The process is transparent, skills-based, and free of bias — focusing solely on your fit for the role. Once the shortlist is completed, we share it directly with the company that owns the job opening. The final decision and next steps (such as interviews or additional assessments) are then made by their internal hiring team.
Thank you for your interest!
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.