Sentinel Blue is looking for a SOC Analyst to join our Security Operations Center. This role is for an analyst with some experience in a security analyst role or entry-level for someone with experience in an IT administration role. Our ideal person for this role has a background in IT and is still in their transition to full-time security work, but has exposure to working in a SOC; they should be a natural investigator and get enjoyment out of solving interesting problems. This role is primarily responsible for receiving, handling and escalating security alerts, conducting investigations and initiating remediation of security events. Additionally, this role contributes to cybersecurity projects, primarily improving alerting and SOC processes.
This is a full-time remote position. Due to the nature of our work, you must be a U.S. citizen with eligibility for a clearance. No exceptions.
A day in the SOC Analyst role:
The SOC Analyst starts the day with a standup call/check-in with the Operations team to review current issues. Then, the Analyst will begin reviewing security alerts, vulnerability reports and security incident information produced by our stack of security tools. The Analyst investigates notable events, takes action on incidents and produces reports for internal and client stakeholders. Then, the Analyst gets to work on their latest project; this might be writing new threat hunting queries for the SIEM & EDR system, or documenting a remediation for an open vulnerability, or writing a how-to article for an internal tool. Throughout the day, the Analyst continues to monitor alerts and responds to anything actionable.
Responsibilities:
What We Can Offer:
Sentinel Blue is a young company with a focused mission: We're bringing enterprise-class cybersecurity to small and medium sized businesses. Frankly, we're pushing the envelope of how things are done and constantly seeking innovative ways to meet that mission. The pace is fast, and we're always learning new things. This is a great place if you want to expose yourself to new and emerging technologies, want to be challenged, and want to build your skills. Further, success in this role can quickly transition into a team leadership role. The right person will find themselves in a fun, dynamic environment, working on interesting problems and making a real difference.
You will be required to achieve a Security+ certification in the first 12 months of hire; we'll cover your certification costs and provide paid time for you to study!
Requirements:
U.S. citizenship - by nature of our work with the defense industry, all employees must be eligible for a Secret clearance.
**General knowledge of security operations, including use of a SIEM/SOAR platform.
**
Basic knowledge of cloud architecture, modern IT infrastructure, security best practices and networking concepts.
Basic knowledge of IT systems, including virtualization, Windows 10, endpoint management, and desktop support.
Ability to independently investigate and understand security events and recommend proper courses of action.
Strong written communication skills.
Intermediate understanding of security fundamentals (least privilege, RBAC, audit logging, endpoint security, change management).
Desired Qualifications:
Benefits:
**
**