SOC Analyst T2
Miami, Florida, United States
Kaseya
Kaseya is a leading global provider of IT management solutions, helping MSPs and IT teams grow smarter through streamlined and simplified IT operations.Kaseya® is the leading provider of complete IT infrastructure and security management solutions for Managed Service Providers (MSPs) and internal IT organizations worldwide powered by AI. Kaseya’s best-in-breed technologies allow organizations to efficiently manage and secure IT to drive sustained business success. Kaseya has achieved sustained, strong double-digit growth over the past several years and is backed by Insight Venture Partners www.insightpartners.com), a leading global private equity firm investing in high-growth technology and software companies that drive transformative change in the industries they serve.
Founded in 2000, Kaseya currently serves customers in over 20 countries across a wide variety of industries and manages over 15 million endpoints worldwide. To learn more about our company and our award-winning solutions, go to www.Kaseya.com and for more information on Kaseya’s culture, please click here: Kaseya Culture.
Kaseya is not your typical company. We are not afraid to tell you exactly who we are and our expectations. The thousands of people that succeed at Kaseya are prepared to go above and beyond for the betterment of our customers.
SOC Tier 2 Analyst – Cybersecurity Operations
We’re looking for a skilled and motivated SOC Tier 2 Analyst to join our 24x7 cybersecurity operations team. If you thrive in high-stakes environments, have a sharp eye for anomalies, and enjoy diving deep into incident response, this role is for you.
Key Responsibilities
- Monitor, analyze, and triage security events across Windows, macOS, and Linux systems in a 24x7 environment.
- Detect and investigate suspicious or malicious activity across Microsoft 365, Entra, Windows environments, and firewalls.
- Lead incident detection, response, and remediation efforts.
- Manage and resolve tickets within the Managed SOC queue.
- Conduct deep-dive incident analysis by correlating data from multiple sources to assess impact on critical systems.
- Operate independently and take initiative in a fast-paced setting.
What You Bring
- Bachelor’s degree in Cybersecurity, Information Systems, IT, Computer Science, or a related field is a MUST
- Security+ certification (required); SSCP or CEH is a plus.
- Hands-on experience with malware analysis (static and dynamic), phishing, ransomware, and 0-day vulnerabilities.
- Familiarity with MITRE ATT&CK and NIST frameworks.
- Solid understanding of networking fundamentals (e.g., IP subnetting, LAN components, public vs. private IP).
- Experience with firewalls, syslog, JSON, and other network log formats.
- Scripting knowledge in PowerShell, Python, CMD, etc.
- Strong written and verbal communication skills.
- Willingness to work flexible hours, including nights and weekends, in a 24x7 environment.
- Must be authorized to work in the U.S. and able to pass a background check.
Join the Kaseya growth rocket ship and see how we are #ChangingLives !
Additional information
Kaseya provides equal employment opportunity to all employees and applicants without regard to race, religion, age, ancestry, gender, sex, sexual orientation, national origin, citizenship status, physical or mental disability, veteran status, marital status, or any other characteristic protected by applicable law.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CEH Computer Science Firewalls Incident response IT infrastructure JSON Linux MacOS Malware MITRE ATT&CK NIST NIST Frameworks PowerShell Python Scripting SOC SSCP Vulnerabilities Windows Zero-day
Perks/benefits: Flex hours Startup environment Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.