L1 SOC Analyst
Job Title: L1 SOC Analyst
Department: Security Operations Center
Pay Type: SALARIED EXEMPT
Report To: Director, Security Operations Center
Summary Of Position Role/Responsibilities
Quzara, a Cyber Security Firm at the forefront of defending against cyber threats, is actively seeking a dedicated L1 SOC Analyst for a fully remote role. This position is integral to our Security Operations Center (SOC), focusing on the initial monitoring, analysis, and triage of security events and incidents. The L1 SOC Analyst will utilize advanced security tools and technologies to identify potential security threats and collaborate with senior analysts for deeper investigations. Ideal candidates will have a foundational understanding of cybersecurity principles, technologies, and a keen interest in advancing their career in cybersecurity analysis.
Essential Functions Of The Job
This is a full-time position. Standard business hours are Monday through Friday 8:30 AM to 5:30 PM. If your role falls within our Security Operations Center you will be assigned a specific shift. As a result, your working schedule may require flexibility to cover any shift that falls within a 24/7 cycle, it may also change and rotate, including nights, weekends, and holidays.
Education, Training, And Experience
The Company is an Equal Employment Opportunity (EEO) employer and does not discriminate based on race, color, religion, sex, sexual orientation, national origin, age, marital status, disability, veteran's status, or any other basis protected by applicable discrimination laws.
Two positions to fill one for each of the following shifts listed below.
Monday - Friday: Day Shift | 8:30 AM - 5:00 PM EST
Monday - Friday: Night Shift | 4:30 PM - 1:00 AM EST
Department: Security Operations Center
Pay Type: SALARIED EXEMPT
Report To: Director, Security Operations Center
Summary Of Position Role/Responsibilities
Quzara, a Cyber Security Firm at the forefront of defending against cyber threats, is actively seeking a dedicated L1 SOC Analyst for a fully remote role. This position is integral to our Security Operations Center (SOC), focusing on the initial monitoring, analysis, and triage of security events and incidents. The L1 SOC Analyst will utilize advanced security tools and technologies to identify potential security threats and collaborate with senior analysts for deeper investigations. Ideal candidates will have a foundational understanding of cybersecurity principles, technologies, and a keen interest in advancing their career in cybersecurity analysis.
Essential Functions Of The Job
- Monitor security events and alerts utilizing advanced security technologies and tools such as Microsoft Sentinel, Defender technologies, and Log Analytics.
- Assist with the initial identification and triage of potential security threats using threat intelligence.
- Support the response to security incidents, providing initial analysis and escalating to senior analysts as necessary.
- Gain proficiency in KQL Queries to assist in investigations and derive insights from potential security threats.
- Collaborate with other SOC team members to resolve security incidents and enhance the overall security posture.
- Participate in initial incident response efforts under the guidance of senior team members, adhering to NIST guidelines.
- Contribute to the continuous improvement of security operations by identifying trends and anomalies in security events.
- Communicate effectively with team members and stakeholders regarding security incidents and initial findings.
- Show willingness to work in a 24/7 environment, including shifts and on-call rotations.
- Begin to understand the requirements for working in government environments and the associated incident response procedures based on NIST guidelines.
- Start to develop skills in implementing and utilizing Microsoft Sentinel for SIEM and SOAR concepts.
- Learn to use Azure Sentinel for the detection and response to security threats and anomalies.
- Acquire knowledge on techniques utilizing the MITRE ATT&CK framework for incident investigation and basic threat hunting.
- Initiate understanding in conducting basic investigations and identifying suspicious activities through log analysis.
- Other duties as assigned
This is a full-time position. Standard business hours are Monday through Friday 8:30 AM to 5:30 PM. If your role falls within our Security Operations Center you will be assigned a specific shift. As a result, your working schedule may require flexibility to cover any shift that falls within a 24/7 cycle, it may also change and rotate, including nights, weekends, and holidays.
Education, Training, And Experience
- 1-3 years of experience in a SOC Analyst role, preferably in a SOC/MXDR or MSSP environment.
- Basic understanding of networking technologies.
- Familiarity with Microsoft security technologies such as Microsoft Sentinel and M365 Defender.
- Initial understanding of security best practices and incident response procedures.
- Exposure to threat intelligence and the importance of its use in security operations.
- Developing proficiency with KQL Queries.
- Effective verbal and written communication skills.
- Strong analytical and problem-solving skills, with a desire to learn and grow within the cybersecurity field.
- Interest in obtaining Microsoft Security certifications such as Azure Security Engineer Associate is encouraged.
- Willingness to work in a 24/7 environment, including flexibility to cover various shifts.
- Motivation to learn and apply techniques utilizing the MITRE ATT&CK framework for basic incident investigation and threat hunting.
- Eagerness to develop skills in scripting languages such as Python, PowerShell, and JavaScript for automation and analysis tasks.
- An understanding of the importance of working in compliance with government environments and NIST guidelines.
The Company is an Equal Employment Opportunity (EEO) employer and does not discriminate based on race, color, religion, sex, sexual orientation, national origin, age, marital status, disability, veteran's status, or any other basis protected by applicable discrimination laws.
Two positions to fill one for each of the following shifts listed below.
Monday - Friday: Day Shift | 8:30 AM - 5:00 PM EST
Monday - Friday: Night Shift | 4:30 PM - 1:00 AM EST
-
Seniority level
Entry level -
Employment type
Full-time -
Job function
Information Technology -
Industries
Computer and Network Security
Referrals increase your chances of interviewing at Quzara LLC by 2x
See who you knowGet notified about new Security Operations Center Analyst jobs in United States.
Sign in to create job alertSimilar jobs
People also viewed
-
Cybersecurity Specialist
Cybersecurity Specialist
-
SOC Analyst
SOC Analyst
-
Network Security Analyst
Network Security Analyst
-
Entry-Level IT/Security GRC Analyst
Entry-Level IT/Security GRC Analyst
-
Remote Work - Need Sr IT Security Analyst
Remote Work - Need Sr IT Security Analyst
-
IT Security Analyst
IT Security Analyst
-
IT Security Analyst – Junior-Level
IT Security Analyst – Junior-Level
-
Cyber Security Engineer
Cyber Security Engineer
-
Cyber Security Engineer, SOC Engineer
Cyber Security Engineer, SOC Engineer
-
IT Security Analyst - Remote
IT Security Analyst - Remote
Similar Searches
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More