Sentinel Blue · 13 hours ago
SOC Analyst I
Sentinel Blue is dedicated to providing enterprise-class cybersecurity solutions to small and medium-sized businesses. They are seeking a SOC Analyst I to monitor security incidents, perform investigations, and assist in threat management as part of their Security Operations Center.
Cloud ComputingCyber SecurityCloud SecurityIT Management
Responsibilities
Continuously monitor the Security Information and Event Management (SIEM) dashboard and leverage security tools to detect potential security incidents and anomalies in real-time
Analyze incoming alerts to determine their relevance and urgency; effectively distinguish between false and true positives to prioritize response efforts
Conduct investigations by gathering context and other relevant logs to understand scope of alert
Strictly adhere to established Service Level Agreements (SLAs), Incident Response (IR) playbooks and Standard Operating Procedures (SOPs) to ensure consistent and compliant handling of security events
Create, update, and manage tickets in our case management system, ensuring all investigative steps, communications, and findings are thoroughly documented
Identify and escalate complex or high-severity incidents to Tier II or Incident Response Team, providing clear details and a comprehensive summary of initial findings
Perform basic remediation actions, such as blocking indicators and isolating compromised hosts, when authorized by SOPs or directed by senior personnel
Demonstrate excellent verbal and written communication skills, when communicating with team members, clients, and/or stakeholders
Contribute to the team’s knowledge base, creating or updating articles, SOPs, and/or playbooks when new trends or resolution methods are identified
Qualification
Required
U.S. citizenship - by nature of our work with the defense industry, all employees must be eligible for a Secret clearance
Minimum of 0-2 years of experience in a Security Operations Center and/or a combination of experience in IT Support, Networking, or System Administration
CompTIA Security+ certification is required within the first 2 months of hire
Preferred
Associate's or Bachelor's degree in Cybersecurity, Information Systems, Computer Science, or a related technical field
CompTIA Security+, GIAC Security Essentials (GSEC), Security Blue Team Level 1 (BTL1), and/ or Microsoft Security Operations Analyst (SC-200)
Professional portfolio of projects: e.g. Github, article write-ups, home labs, etc
Participation in Capture-the-Flag (CTF) competitions, hackathons, bug bounties, and/or holds a high ranking on a platform (e.g. top 10% in Hack the Box)
Benefits
Fully paid individual healthcare, vision and dental insurance for the employee.
Paid certification and training opportunities.
Three weeks of paid vacation + 10 paid holidays.
A supportive environment with a focus on keeping healthy work-life balance.
Retirement benefit (401k) with company match.
Company
Sentinel Blue
Sentinel Blue is a cybersecurity company that offers extensive managed IT, cloud, and cybersecurity solutions to SMEs.
Funding
Current Stage
Early StageRecent News
Company data provided by crunchbase