Tier 2 SOC Analyst - REMOTE

Houston, TX, US

Binary Defense

Binary Defense combines the right people, processes, and technologies to deliver world-class MDR across endpoint, network, cloud, and more.

View all jobs at Binary Defense

Apply now Apply later

Description


Binary Defense (BD) is seeking a talented Tier 2 SOC Analyst. Responsibilities will include, but not be limited to network security analysis, monitoring and incident response.


SOC Analysts work with and learn from experienced security team leaders and use the latest technology to detect, analyze and limit intrusions and security events. Candidates must be willing to work in a 24x7x365 SOC environment, demonstrate intuitive problem-solving skills and allow for flexible scheduling.


The SOC Analyst will work collaboratively to detect and respond to information security incidents, maintain and follow procedures for security event alerting, and participate in security investigations.


Responsibilities


  • Actively participate in and contribute to 24x7x365 security operations
  • Actively monitor and react across multiple customer environments and provide comprehensive analysis and investigation of notable events as directed
  • Communicate and collaborate with customers through the lifecycle of all escalated security events and investigations.
  • Proactively identify areas of maturation surrounding detections and playbooks while collaborating across organizational lines to implement proposed changes without compromising key tactical vantage points of visibility.
  • Proactively identify opportunities to improve workflow of junior analysts within applicable services
  • Mentor assigned Tier 1 SOC Analysts

Requirements


  • 3+ years experience working within a Security Operations Center.
  • 3+ years experience working across multiple security disciplines (DFIR, log analysis, packet analysis, etc.)
  • Demonstrated knowledge and experience with Lockheed Martin’s Cyber Kill Chain and the MITRE ATT&CK Framework
  • Experience working within 1 or more SOAR platforms preferred.
  • Preferred certifications: CISSP, GCIH, GCIA, GCDA, GMON
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  21  7  0

Tags: CISSP Cyber Kill Chain DFIR Forensics GCIA GCIH Incident response Log analysis MITRE ATT&CK Monitoring Network security Security analysis SOAR SOC

Perks/benefits: Flex hours Team events

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.