Tier 3 SOC Analyst - REMOTE

Houston, TX, US

Binary Defense

Binary Defense combines the right people, processes, and technologies to deliver world-class MDR across endpoint, network, cloud, and more.

View all jobs at Binary Defense

Apply now Apply later

Description

  

Binary Defense (BD) is seeking a talented Tier 3 SOC Analyst. The Tier 3 SOC Analyst will:

  • Work collaboratively to detect and respond to information security incidents, maintain and follow procedures for security event alerting, and participate in security investigations.
  • Perform tasks including monitoring, research, classification and analysis of security events that occur on the network or endpoint.
  • Have familiarity with the principals of network and endpoint security, current threat and attack trends, and have a working knowledge of security principals such as defense in depth.
  • Work at a high technical level and be capable of identifying threats, and threat vectors that cause security events.

Responsibilities:

  • Actively participate in and contribute to 24x7x365 security operations across Binary Defense’s customer portfolio.
  • Actively monitor and react across multiple customer environments and provide comprehensive analysis and investigation of notable events as directed.
  • Communicate and collaborate with customers through the lifecycle of all escalated security events and investigations.
  • Gather meaningful data points to communicate and present to assigned customers during weekly/bi-weekly touchpoint calls as directed.
  • Proactively identify areas of maturation surrounding detections and playbooks while collaborating across organizational lines to implement proposed changes without compromising key tactical vantage points.
  • Proactively identify opportunities to improve workflow of junior analysts within applicable services.
  • Contribute to, write, and QC all standard operating procedures and playbook.
  • Be “on-call” during off-hours.
  • Be flexible with SOC scheduling (there may be a need to work a temporary or permanent shift to allow for 24x7x365 coverage which may include weekends and holidays).
  • Mentor assigned Tier 2 SOC Analysts

Requirements

  

  • Must be a US Citizen and reside in the continental US.
  • 5+ years’ experience working within a security operations center.
  • 5+ years’ experience working across multiple security disciplines (DFIR, log analysis, packet analysis, reverse engineering, detection strategies, etc.)
  • 2-3+ years of leadership or senior analyst experience within a SOC environment.
  • Demonstrated knowledge and experience with Lockheed Martin’s Cyber Kill Chain and the MITRE ATT&CK Framework
  • Experience working within 1 or more SOAR platforms preferred.
  • Two or more of the following (or equivalent) certifications: CISSP, GCIH, GCFA, GNFA, GREM

About Binary Defense


Binary Defense is a trusted leader in security operations, supporting companies of all sizes to proactively monitor, detect and respond to cyberattacks. The company offers a personalized Open XDR approach to Managed Detection and Response, advanced Threat Hunting, Digital Risk Protection, Phishing Response, and Incident Response services, helping customers mature their security program efficiently and effectively based on their unique risks and business needs.


With a world-class 24/7 SOC, deep domain expertise in cyber, and sophisticated technology, hundreds of companies across every industry have entrusted Binary Defense to protect their business. Binary Defense gives companies actionable insights within minutes not hours, the confidence in their program to be resilient to ever-changing threats, and the time back that matters most to their business.

Binary Defense is also the Trusted Cybersecurity Partner of the Cleveland Browns and partners with PGA TOUR players. For more information, visit our website, check out our blog, or follow us on LinkedIn.


Binary Defense offers competitive medical, dental and vision coverage for employees and dependents, a 401k match which vests every payroll, a flexible and remote friendly work environment, as well as training opportunities to expand your skill set (to name a few!). If you’re interested in joining a growing team with great perks, we encourage you to apply!

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  27  4  0

Tags: Business Intelligence CISSP Cyber Kill Chain DFIR Endpoint security Forensics GCFA GCIH GNFA GREM Incident response Log analysis MITRE ATT&CK Monitoring Reverse engineering SOAR SOC XDR

Perks/benefits: 401(k) matching Flex hours Flex vacation Health care Team events

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.