This is a remote position.
The SOC Analyst will be responsible for monitoring, analyzing, and responding to securityalerts across Azure and enterprise environments. This role focuses on operational securitymonitoring, incident triage, investigation, and coordination of response activities tomaintain the organization’s security posture.
Key Responsibilities:
•Monitor and triage alerts from Microsoft Defender for Cloud, Azure security logs,and other security platforms Investigate security events and document findings inaccordance with incident response procedures
•Escalate confirmed threats and coordinate remediation with appropriate teamsManage and track operational security alerts to closure
•Support vulnerability remediation tracking and follow-up Maintain accurate incidentdocumentation and reporting
•Participate in security monitoring improvements and detection tuning
Required Qualifications
•1 year of experience in a SOC or security operations role
•AZ-900 (Microsoft Azure Fundamentals) certification
•Understanding of cloud security principles, especially within Azure Experienceanalyzing logs and security alerts
•Knowledge of incident response processes and escalation procedures
•Strong analytical and problem-solving skills
Preferred / Good to Have:
•Experience with CrowdStrike Experience with Tenable One
•Familiarity with Microsoft Sentinel or other SIEM platforms
•Knowledge of the MITRE ATT&CK framework
•Basic scripting capability (PowerShell, Python)
•Compliance & Framework Knowledge Familiarity with CIS Controls v8
•Understanding of NIST CSF or similar cybersecurity frameworks Exposure toregulatory compliance standards and audit processes Experience working withinpolicy-driven securityenvironments
•Bachelor’s degree in Information Security, Computer Science, or related field
•Relevant security certifications preferred (Comptia+, Security+, CySA+, SC-200)