SOC Analyst Tier 1

Miami, Florida, United States

Kaseya

Kaseya's IT Complete is an integrated and cost-effective platform to manage everything in IT and security.

View all jobs at Kaseya

Apply now Apply later

Kaseya® is the leading provider of complete IT infrastructure and security management solutions for Managed Service Providers (MSPs) and internal IT organizations worldwide powered by AI. Kaseya’s best-in-breed technologies allow organizations to efficiently manage and secure IT to drive sustained business success. Kaseya has achieved sustained, strong double-digit growth over the past several years and is backed by Insight Venture Partners www.insightpartners.com), a leading global private equity firm investing in high-growth technology and software companies that drive transformative change in the industries they serve.

Founded in 2000, Kaseya currently serves customers in over 20 countries across a wide variety of industries and manages over 15 million endpoints worldwide. To learn more about our company and our award-winning solutions, go to www.Kaseya.com and for more information on Kaseya’s culture, please click here: Kaseya Culture.

Kaseya is not your typical company. We are not afraid to tell you exactly who we are and our expectations. We have achieved record levels of success being BOLD, being GRITTY, being ACCOUNTABLE. The thousands of people that succeed at Kaseya are prepared to go above and beyond for the betterment of our customers, and the betterment of their careers and long-term financial wealth. 

As a Managed SOC Analyst Tier 1, you will be responsible for monitoring, analyzing, and triaging systems and events across Windows, macOS, and Linux in a 24x7 operations environment. You will identify suspicious or malicious activity spanning Windows Environments, Microsoft 365 & Entra, and Firewalls. Your role will involve performing incident detection, response, and remediation, addressing and resolving Managed SOC tickets, and conducting deep-dive incident analysis by correlating data from various sources to determine if critical systems are affected. You will perform tasks independently without supervision and escalate issues to the Tier II Analyst as needed.

Requirements:

  • Bachelor's degree in Cybersecurity, Management and Information Systems, Information Technology, Computer Science, or related fields.
  • Minimum certification of Security+, with SSCP and CEH being a plus.
  • Familiarity with static and dynamic malware analysis techniques, 0-day vulnerabilities, phishing attacks, and ransomware attack groups.
  • Knowledge of MITRE ATT&CK, NIST frameworks, and common networking components such as IP subnetting, private vs. public IP, and LAN components.
  • Proficiency in various firewalls, syslog, JSON, and other network log formats.
  • Experience with PowerShell, Python, CMD, etc.
  • Excellent written and verbal communication skills.
  • Ability to work in 24x7 environments, including nights and weekends.
  • Must be authorized to work within the US and pass a background check.

Join the Kaseya growth rocket ship and see how we are #ChangingLives !

Additional information
Kaseya provides equal employment opportunity to all employees and applicants without regard to race, religion, age, ancestry, gender, sex, sexual orientation, national origin, citizenship status, physical or mental disability, veteran status, marital status, or any other characteristic protected by applicable law.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  11  3  0

Tags: CEH Computer Science Firewalls IT infrastructure JSON Linux MacOS Malware MITRE ATT&CK Monitoring NIST NIST Frameworks PowerShell Python SOC SSCP Vulnerabilities Windows Zero-day

Perks/benefits: Startup environment Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.