SOC Analyst - Remote jobs in United States
cer-icon
Apply on Employer Site
company-logo

YO HR Consultancy · 4 hours ago

SOC Analyst - Remote

YO HR Consultancy is hiring a SOC Investigation Specialist to support high-growth technology and enterprise partners in building next-generation SOC automation and AI-driven investigation systems. The role involves applying investigative judgment to review and validate security investigations across various environments, including SIEM, endpoint, cloud, and identity.

Management Consulting

Responsibilities

Review, monitor, and evaluate SOC alerts and investigation outputs based on predefined scenarios and criteria
Distinguish true positives from false positives by validating investigative evidence and alert context
Perform end-to-end security investigations when required, including log analysis, entity pivoting, timeline reconstruction, and evidence correlation
Assess the correctness, completeness, and quality of SOC investigations produced by automated or human workflows
Apply consistent investigative judgment while recognizing that multiple valid investigation paths may exist for the same alert
Make clear binary determinations (e.g., ACCEPT / PASS) while also producing detailed ground-truth investigations when required
Use Splunk extensively to pivot across logs, entities, and timelines, including reading and reasoning about SPL queries
Maintain clear and accurate documentation of investigative steps, assumptions, evidence, and conclusions
Collaborate with program leads and other expert annotators to uphold high-quality investigation and annotation standards
Mentor or support other analysts where applicable, particularly in long-term or lead annotator roles

Qualification

SOC analysisSplunkIncident investigationCloud securityInvestigative judgmentScripting (Python)Security certificationsCommunication skills

Required

3+ years of hands-on experience as a SOC analyst in a production SOC environment (Tier 2 or above strongly preferred)
Strong understanding of alert triage, incident investigation workflows, and evidence-based decision-making under time constraints
Mandatory hands-on experience with Splunk, including: Conducting investigations using Splunk, Reading, understanding, and reasoning about SPL queries, Pivoting between logs, entities, and timelines
Proven ability to evaluate SOC investigations and determine whether conclusions are valid, incomplete, or incorrect
Strong investigative judgment and comfort making decisive evaluations
Fluent English (written and spoken) with strong documentation and communication skills

Preferred

Experience with Endpoint Detection & Response (EDR) tools such as CrowdStrike Falcon, Microsoft Defender for Endpoint, or SentinelOne
Experience analyzing cloud security logs and signals: AWS (CloudTrail, GuardDuty), Azure (Activity Log, Defender for Cloud), GCP (Cloud Audit Logs)
Familiarity with Identity & Access Management platforms such as Okta Identity Cloud or Microsoft Entra ID (Azure AD)
Experience with email security tools like Proofpoint or Mimecast
SOC leadership or mentoring experience
Basic scripting experience (Python or similar)
Security certifications (optional): GCIA, GCIH, GCED, Splunk certifications, Security+, CCNA, or cloud security certifications

Benefits

Payments are weekly on Stripe or Wise based on services rendered.

Company

YO HR Consultancy

twitter
company-logo
YO HR (Your Own) human resources established with an ambition to providing Placement to potential Job seekers; headquartered at Indore.

Funding

Current Stage
Growth Stage
Company data provided by crunchbase