drjobs SOC Analyst - Remote

SOC Analyst - Remote

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Toronto - Canada

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Position Overview

We are seeking a proactive and detail-oriented SOC Analyst to monitor detect and respond to cybersecurity incidents in real time. The role involves working in a Security Operations Center (SOC) environment analyzing security alerts investigating suspicious activities and escalating threats when necessary. The ideal candidate will have strong technical knowledge of security tools threat detection and incident response processes.

Key Responsibilities

  • Monitor and analyze security events and alerts from SIEM IDS/IPS EDR firewalls and other security tools.

  • Investigate and triage security incidents determining severity and impact.

  • Respond to cybersecurity threats by containing mitigating and documenting incidents.

  • Conduct log analysis packet analysis and threat hunting activities.

  • Assist in developing and tuning correlation rules detection signatures and playbooks.

  • Escalate critical incidents to senior analysts or incident response teams.

  • Collaborate with IT DevOps and security engineers to ensure timely remediation.

  • Prepare incident reports threat intelligence summaries and SOC metrics dashboards.

  • Participate in red team/blue team exercises to improve detection and response.

  • Stay updated on the latest cyber threats vulnerabilities and attack techniques.

Qualifications

  • Bachelors degree in Cybersecurity Information Technology or related field (or equivalent experience).

  • 13 years of experience in cybersecurity operations SOC or incident response.

  • Knowledge of common attack techniques malware behavior and threat actor tactics (MITRE ATT&CK framework).

  • Hands-on experience with SIEM tools (Splunk QRadar ELK Microsoft Sentinel ArcSight etc.).

  • Familiarity with endpoint protection (EDR) firewalls IDS/IPS and threat intelligence platforms.

  • Basic knowledge of network protocols operating systems (Windows Linux) and cloud environments.

  • Strong analytical problem-solving and communication skills.

Preferred Skills

  • Security certifications such as:

    • CompTIA Security / CySA

    • GIAC Security Essentials (GSEC)

    • GIAC Certified Incident Handler (GCIH)

    • Certified SOC Analyst (CSA)

  • Experience with threat hunting and malware analysis.

  • Familiarity with SOAR platforms (Security Orchestration Automation & Response).

  • Knowledge of compliance frameworks (ISO 27001 NIST GDPR PCI-DSS HIPAA).

Benefits

  • Competitive salary with performance bonuses.

  • Comprehensive health dental and vision insurance.

  • Certification sponsorship and professional development programs.

  • Flexible work schedule (onsite hybrid remote options).

  • Career growth opportunities into SOC Lead Threat Hunter or Incident Response Specialist roles.

Employment Type

Full Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.