Senior Tier 2 SOC Analyst

Binary Defense • United State
Remote
Apply
AI Summary

Binary Defense seeks a Senior Tier 2 SOC Analyst to work in a 24x7x365 remote Security Operations Center. The ideal candidate will have experience in multiple security disciplines and knowledge of the Lockheed Martin's Cyber Kill Chain and the MITRE ATT&CK Framework. This is a 6+ month contract with potential for full-time employment.

Key Highlights
Work in a 24x7x365 remote Security Operations Center
Collaborate with experienced security team leaders and use the latest technology
Detect, analyze, and limit intrusions and security events
Mentor junior analysts
Participate in security investigations and incident response
Technical Skills Required
Lockheed Martin's Cyber Kill Chain MITRE ATT&CK Framework SOAR platforms Log analysis Packet analysis DFIR
Benefits & Perks
6+ month contract with potential for full-time employment
100% remote work
Training on clients, processes, and technologies
Flexible scheduling

Job Description


Binary Defense is seeking a talented Tier 2 SOC Analyst to work as part of our 24x7x365 Security Operations Center team. Our SOC is 100% Remote. You will be provided with equipment to work remotely and will receive training on our clients, processes, and technologies.


PLEASE NOTE: This is a 6+ month contract with possibility of becoming a permanent, full-time, salary position with full benefits.


SOC Analysts work with and learn from experienced security team leaders and use the latest technology to detect, analyze and limit intrusions and security events. Candidates must be willing to work in a 24x7x365 SOC environment, demonstrate intuitive problem-solving skills and allow for flexible scheduling.


The SOC Analyst will work collaboratively to detect and respond to information security incidents, maintain and follow procedures for security event alerting, and participate in security investigations.


Responsibilities:


  • Actively participate in and contribute to 24x7x365 security operations
  • Actively monitor and react across multiple customer environments and provide comprehensive analysis and investigation of notable events as directed
  • Communicate and collaborate with customers through the lifecycle of all escalated security events and investigations.
  • Proactively identify areas of maturation surrounding detections and playbooks while collaborating across organizational lines to implement proposed changes without compromising key tactical vantage points of visibility.
  • Proactively identify opportunities to improve workflow of junior analysts within applicable services
  • Mentor assigned Tier 1 SOC Analysts


Requirements:


  • 3+ years experience working within a Security Operations Center.
  • 3+ years experience working across multiple security disciplines (DFIR, log analysis, packet analysis, etc.)
  • Demonstrated knowledge and experience with Lockheed Martin’s Cyber Kill Chain and the MITRE ATT&CK Framework
  • Experience working within 1 or more SOAR platforms preferred.
  • Preferred certifications: CISSP, GCIH, GCIA, GCDA, GMON

Subscribe our newsletter

New Things Will Always Update Regularly