SIGN IN
SOC Analyst I jobs in United States
cer-icon
Apply on Employer Site
company-logo

Sentinel Blue · 13 hours ago

SOC Analyst I

Sentinel Blue is dedicated to providing enterprise-class cybersecurity solutions to small and medium-sized businesses. They are seeking a SOC Analyst I to monitor security incidents, perform investigations, and assist in threat management as part of their Security Operations Center.
Cloud ComputingCyber SecurityCloud SecurityIT Management
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Continuously monitor the Security Information and Event Management (SIEM) dashboard and leverage security tools to detect potential security incidents and anomalies in real-time
Analyze incoming alerts to determine their relevance and urgency; effectively distinguish between false and true positives to prioritize response efforts
Conduct investigations by gathering context and other relevant logs to understand scope of alert
Strictly adhere to established Service Level Agreements (SLAs), Incident Response (IR) playbooks and Standard Operating Procedures (SOPs) to ensure consistent and compliant handling of security events
Create, update, and manage tickets in our case management system, ensuring all investigative steps, communications, and findings are thoroughly documented
Identify and escalate complex or high-severity incidents to Tier II or Incident Response Team, providing clear details and a comprehensive summary of initial findings
Perform basic remediation actions, such as blocking indicators and isolating compromised hosts, when authorized by SOPs or directed by senior personnel
Demonstrate excellent verbal and written communication skills, when communicating with team members, clients, and/or stakeholders
Contribute to the team’s knowledge base, creating or updating articles, SOPs, and/or playbooks when new trends or resolution methods are identified

Qualification

CompTIA Security+ certificationLog AnalysisNetworkingOperating SystemsPhishing AnalysisThreat EnrichmentBasic Malware AnalysisBasic CryptographyCommon AttacksQueryingScriptingFrameworks

Required

U.S. citizenship - by nature of our work with the defense industry, all employees must be eligible for a Secret clearance
Minimum of 0-2 years of experience in a Security Operations Center and/or a combination of experience in IT Support, Networking, or System Administration
CompTIA Security+ certification is required within the first 2 months of hire

Preferred

Associate's or Bachelor's degree in Cybersecurity, Information Systems, Computer Science, or a related technical field
CompTIA Security+, GIAC Security Essentials (GSEC), Security Blue Team Level 1 (BTL1), and/ or Microsoft Security Operations Analyst (SC-200)
Professional portfolio of projects: e.g. Github, article write-ups, home labs, etc
Participation in Capture-the-Flag (CTF) competitions, hackathons, bug bounties, and/or holds a high ranking on a platform (e.g. top 10% in Hack the Box)

Benefits

Fully paid individual healthcare, vision and dental insurance for the employee.
Paid certification and training opportunities.
Three weeks of paid vacation + 10 paid holidays.
A supportive environment with a focus on keeping healthy work-life balance.
Retirement benefit (401k) with company match.

Company

Sentinel Blue

twittertwittertwitter
company-logo
Sentinel Blue is a cybersecurity company that offers extensive managed IT, cloud, and cybersecurity solutions to SMEs.

Funding

Current Stage
Early Stage

Leadership Team

leader-logo
Andy Sauer
Partner & CISO
linkedin
Company data provided by crunchbase