Interview Process: 1 Teams video screening followed by 1 Teams Video interview with end client ( 1 hr or more) followed by a final round in-person
SOC Analyst
Location: St. Petersburg, FL / Boston, MA / NYC, NY / Baltimore, MD
Duration: 12 months
Experience:
- Minimum 8 years in cybersecurity, with a focus on SOC operations and incident response.
- Environment: Experience in a 24x7 operational environment, preferably across multiple geographies.
- Technical Skills: Good understanding of networking protocols, operating systems (Windows/Linux), and security technologies.
- Exposure to malware analysis and digital forensics.
- Familiarity with cybersecurity frameworks (e.g., NIST, MITRE ATT&CK, ISO 27001).
- Hands-on experience with tools such as: SIEM: Splunk, CrowdStrike, QRadar EDR: CrowdStrike, Carbon Black, SentinelOne SOAR: Palo Alto XSOAR, Splunk SOAR Forensics: FTK Imager, Autopsy, Wireshark, Procmon
- Preferred Certifications: GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) Certified Ethical Hacker (CEH)
- Soft Skills & Attributes: Strong analytical and problem-solving mindset.
- Excellent communication and collaboration skills.
- Ability to work under pressure and manage multiple priorities.
- High integrity and a proactive, team-oriented attitude.
- Strategic and tactical thinking with attention to detail.