SOC Analyst - Tier 2 jobs in United States
cer-icon
Apply on Employer Site
company-logo

Keeper Security, Inc. · 3 days ago

SOC Analyst - Tier 2

Keeper Security, Inc. is a leading cybersecurity company transforming security for organizations globally. They are seeking a Tier 2 SOC Analyst / Watch Officer to lead tactical investigation and remediation efforts for security incidents, while providing operational direction during live security events.

Cloud SecurityCyber SecurityIdentity ManagementSecuritySoftware
check
H1B Sponsor Likelynote

Responsibilities

Lead end-to-end execution of complex DevOps and infrastructure programs, including perform in-depth triage and analysis of escalated alerts to determine scope, impact and root cause
Lead response actions such as isolating hosts, revoking credentials or blocking network indicators
Examine endpoint, network and cloud logs to reconstruct attack timelines and adversary behaviors
Execute and enhance incident response playbooks, detection rules and escalation criteria
Maintain operational command during assigned shifts, ensuring situational awareness, incident logging and proper shift handovers
Conduct proactive threat hunting for suspicious activity and emerging indicators of compromise
Validate data integrity from security tools (SIEM, EDR, IDS, etc.) and assist with tuning or integrations
Partner with IT, DevSecOps and compliance teams to mitigate vulnerabilities and improve defenses
Produce high-quality incident reports, lessons learned and recommendations for leadership

Qualification

SIEM platformsEDR technologiesMITRE ATT&CKNetwork traffic analysisScripting for automationIncident response playbooksRoot cause analysisThreat huntingWritten communicationVerbal communication

Required

Bachelor's degree in Cybersecurity, Computer Science or related field, or equivalent practical experience
2–4 years in a SOC, incident response or cyber defense role
Experience with SIEM platforms (e.g., Splunk, Sumo Logic, Sentinel) and EDR technologies
Strong understanding of MITRE ATT&CK, threat actor TTPs and multi-source log correlation
Hands-on experience analyzing network traffic, endpoint behavior and cloud telemetry
Familiarity with scripting for automation and analysis (Python, PowerShell or Bash)
Strong written and verbal communication skills for incident reporting and coordination

Preferred

Certifications such as GCIA, GCIH, CySA+, CEH or equivalent
Experience with SOAR platforms, automation pipelines and threat intelligence enrichment
Familiarity with AWS Security Hub, GuardDuty or other cloud-native security services
Background in root cause analysis, purple-team exercises or tabletop simulations
Experience supporting regulated environments (SOC 2, FedRAMP, ISO 27001, etc.)

Benefits

Medical, Dental & Vision (inclusive of domestic partnerships)
Employer Paid Life Insurance & Employee/Spouse/Child Supplemental life
Voluntary Short/Long Term Disability Insurance
401K (Roth/Traditional)
A generous PTO plan that celebrates your commitment and seniority (including paid Bereavement/Jury Duty, etc)
Above market annual bonuses

Company

Keeper Security, Inc.

company-logo
Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally.

H1B Sponsorship

Keeper Security, Inc. has a track record of offering H1B sponsorships. Please note that this does not guarantee sponsorship for this specific role. Below presents additional info for your reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2021 (1)

Funding

Current Stage
Late Stage
Total Funding
$60.25M
Key Investors
Summit PartnersInsight Partners
2023-05-09Private Equity
2020-08-13Private Equity· $60M
2011-01-01Seed· $0.25M

Leadership Team

leader-logo
Darren Guccione
Co-founder and CEO
linkedin
leader-logo
Craig Lurey
CTO, Co-founder
linkedin
Company data provided by crunchbase