1. Home
  2. Jobs
  3. SOC Analyst
  4. SOC Analyst
CO
CommITcomm-it.com

SOC Analyst

Worldwide (Remote)Full-time1d ago

Description

We’re looking for a Tier 1 SOC Analyst to join our team and handle initial triage, monitoring, and investigation of security alerts across cloud and endpoint environments.

This is a client-facing role requiring strong English, excellent verbal communication skills, and the ability to clearly communicate findings and escalations. The position is intended for candidates with at least 1 year of hands-on SOC / Security Operations experience.

The role is based on morning shifts aligned with US working hours, 08:00–17:00 US time.

Key Responsibilities:

  • Monitor security alerts from SIEM, EDR, and cloud platforms
  • Perform initial triage and classification of alerts as true or false positives
  • Investigate suspicious activities across endpoints, identities, and cloud environments
  • Escalate confirmed incidents to Tier 2 / Incident Response teams with proper context
  • Analyze logs from multiple sources, including CloudTrail, Azure Activity Logs, OS logs, and other relevant security data sources
  • Document findings clearly in tickets and investigation reports
  • Follow existing playbooks and contribute to improving detection logic over time
  • Communicate clearly with internal teams and clients regarding alerts, findings, and escalations

Requirements

Required Qualifications:

  • 1+ years of experience in SOC / Security Operations
  • Hands-on experience with EDR tools such as CrowdStrike, SentinelOne, or Microsoft Defender for Endpoint
  • Familiarity with SIEM platforms such as Splunk, Microsoft Sentinel, QRadar, or similar
  • Understanding of networking basics, including IP, DNS, HTTP/S, ports, and related concepts
  • Basic knowledge of Linux and Windows operating systems
  • Ability to analyze logs and identify suspicious behavior
  • Fluent English, both written and spoken — mandatory
  • Excellent verbal communication skills, especially in client-facing situations

Preferred Qualifications:

  • Experience with cloud environments such as AWS, Azure, or GCP
  • Knowledge of GCP / Google Cloud Platform — significant advantage
  • Ability to investigate cloud activity, including IAM, API calls, and resource changes
  • Understanding of identity-based attacks, such as token abuse and privilege escalation
  • Experience with scripting in Python or Bas

Nice to Have:

  • Experience with threat hunting
  • Knowledge of MITRE ATT&CK