SIGN IN
SOC Analyst (Level 1) jobs in United States
cer-icon
Apply on Employer Site
company-logo

Keyrock · 18 hours ago

SOC Analyst (Level 1)

Keyrock is a leading change-maker in the digital asset space, known for its innovation and partnerships. The SOC Analyst (Level 1) will serve as the first line of defense for monitoring and escalating security alerts in a high-availability trading environment, ensuring timely response to threats and incidents.
FinanceFinTechCrypto & Web3Asset ManagementBlockchainCryptocurrencyFinancial Services

Responsibilities

24/7 monitoring and alert triage across SIEM/EDR/cloud security tooling; identify false positives vs. credible threats and set appropriate severity
Initial investigation and enrichment: gather relevant logs/telemetry, add context, and document findings clearly in the case/ticketing system
Escalation and coordination: escalate confirmed/suspected incidents quickly and cleanly to L2/IR with a complete handoff (timeline, scope, IOCs, actions taken)
Runbook execution: follow SOPs for common events (phishing, suspicious logins, endpoint detections, cloud key/token risk, malware alerts, data exfiltration signals), including containment actions you’re authorized to perform
Threat-aware analysis: map alerts to adversary behaviors (e.g., MITRE ATT&CK techniques) to improve understanding and escalation quality
Operational hygiene: maintain accurate shift handovers, update watchlists and investigation notes, and identify recurring alert patterns for tuning recommendations

Qualification

SIEM toolsEDR toolsSecurity fundamentalsCloud securityIncident response frameworksLog investigationBasic scriptingDigital asset knowledgeCertificationsWritten communication

Required

0–2 years in a SOC / security monitoring / IT operations role (or equivalent hands-on experience, internships, labs)
Practical knowledge of security fundamentals: networking, DNS, HTTP(S), identity/authentication, and malware basics
Familiarity with log investigation and event triage concepts
Familiarity with common security tools and workflows (any of the following): SIEM (Splunk/Elastic/Sentinel), EDR (CrowdStrike/Defender), ticketing (Jira/ServiceNow), basic SOAR concepts
Strong written communication: produce clear, escalation-ready tickets and timelines
Ability to work rotating shifts/on-call (as required), including weekends/holidays depending on coverage model

Preferred

Cloud security exposure (AWS/GCP/Azure): CloudTrail/Activity Logs, IAM analysis, detections for token/key misuse
Familiarity with incident response frameworks/processes (e.g., NIST incident response guidance)
Exposure to detection engineering concepts (rule tuning, false-positive reduction), or basic scripting (Python/Bash) for investigation automation
Knowledge of the digital-asset ecosystem (exchanges, custody concepts, operational risk in 24/7 trading environments)
Certifications (optional): Security+, Blue Team Level 1, SSCP, or equivalent practical training

Company

Keyrock

twittertwittertwitter
company-logo
Keyrock develops scalable, transparent proprietary algorithmic technologies to increase the liquidity of financial assets.

Funding

Current Stage
Growth Stage
Total Funding
$78.11M
Key Investors
Middlegame Ventures,SIX FinTech VenturesTenityVolta Ventures
2022-11-30Series B· $72M
2020-10-29Series A· $5.02M
2020-04-20Seed

Leadership Team

leader-logo
Kevin de Patoul
CEO & Co-Founder
linkedin
leader-logo
Juan David Mendieta Villegas
Co-Founder
linkedin
Company data provided by crunchbase