SOC 2 Analyst jobs in United States
cer-icon
Apply on Employer Site
company-logo

Plurilock · 22 hours ago

SOC 2 Analyst

Plurilock is a company focused on security operations, and they are seeking a SOC 2 Analyst to investigate security incidents and determine their root causes. The role involves reviewing escalated incidents, utilizing threat intelligence, and monitoring systems across various operating systems.

BiometricsCyber SecurityIdentity ManagementInformation TechnologyNetwork Security

Responsibilities

Responsible for investigating security incidents and determining their root causes
They review incidents that have been escalated by Tier 1 analysts, who are responsible for collecting data and reviewing alerts
Tier 2/3 analysts use threat intelligence, such as indicators of compromise, TTPs, and company host system/network data sets to assess the alerts, threats and potential incidents in more depth
They have deep experience with SIEM tools specifically Crowdstrike SIEM, network data, host data, Identity and Access log data, developing SIEM use cases, reducing/tuning false alerts and leading investigations until issues have been resolved
They will also monitor systems and events across different operating systems, such as Windows, macOS, and Linux
Must be proactive, problem solver and curious
Must have 5+ years recent experience as Tier 2 or 3 analyst at a large organization; government and Critical Infrastructure company preferred
Must have strong, demonstrated SIEM and data correlation experience
Must have demonstrated experience designing new SOC use cases and working with vendor on implementing new use cases
Must have experience designing and implementing runbooks and use cases to mitigate security incidents
Experience designing Incident Response plan, including alert definition, runbooks, escalation, etc
Must have extensive experience reviewing and managing alerts in Microsoft Defender, Splunk and or Crowdstrike
Must have experience conducting hunts across disparate data sets, to include host data, vulnerability data, threat data, network data, active directory data, among others to identify threats
Experience leading timely security operations response efforts in collaboration with stakeholders
Experience documenting incident response communications for technical and management audiences
Must have experience setting up alert rules and effective alert management
Demonstrated ability to create runbooks and conducting investigations with key application, IT Infra and other stakeholders
Experience designing custom SOC SIEM use cases in Defender, Splunk and CRWD
Experience conducting forensic work investigations
Most be a problem solver
Must be curious
Must be analytical, qualitative and quantitative abilities
Must be adaptive to dynamic environment
Strong security operations documentation abilities

Qualification

SIEM toolsCrowdstrike SIEMIncident Response planningMicrosoft DefenderSplunkData correlationCuriosityAnalytical abilitiesProblem solvingDocumentation skills

Required

5+ years recent experience as Tier 2 or 3 analyst at a large organization; government and Critical Infrastructure company preferred
Strong, demonstrated SIEM and data correlation experience
Demonstrated experience designing new SOC use cases and working with vendor on implementing new use cases
Experience designing and implementing runbooks and use cases to mitigate security incidents
Experience designing Incident Response plan, including alert definition, runbooks, escalation, etc
Extensive experience reviewing and managing alerts in Microsoft Defender, Splunk and or Crowdstrike
Experience conducting hunts across disparate data sets, to include host data, vulnerability data, threat data, network data, active directory data, among others to identify threats
Experience leading timely security operations response efforts in collaboration with stakeholders
Experience documenting incident response communications for technical and management audiences
Experience setting up alert rules and effective alert management
Demonstrated ability to create runbooks and conducting investigations with key application, IT Infra and other stakeholders
Experience designing custom SOC SIEM use cases in Defender, Splunk and CRWD
Experience conducting forensic work investigations
Must be proactive, problem solver and curious
Must be analytical, qualitative and quantitative abilities
Must be adaptive to dynamic environment
Strong security operations documentation abilities

Company

Plurilock

twittertwittertwitter
company-logo
Plurilock provides invisible MFA and continuous authentication using behavioral-biometric and machine learning technology.

Funding

Current Stage
Public Company
Total Funding
$13.5M
Key Investors
National Research Council of Canada Industrial Research Assistance Program
2025-10-31Post Ipo Debt· $2.13M
2024-04-03Post Ipo Equity· $0.67M
2022-10-27Post Ipo Equity· $0.28M

Leadership Team

leader-logo
Ian Paterson
CEO
linkedin
leader-logo
Michael Ruiz
Chief Technology Officer
linkedin
Company data provided by crunchbase