About Binary Defense:
· Binary Defense is a rapidly growing cybersecurity services and software firm with solutions which include Managed Detection and Response (MDR) delivered from our 24x7x365 Security Operations Center (SOC), proprietary Endpoint Protection software, Security Information and Event Management (SIEM), Threat Hunting, and Counterintelligence.
· For the fourth year in a row, Binary Defense has been recognized as one of the fastest growing private companies in the United States!
· At Binary Defense, we use the latest technology to monitor security alerts and detect malicious activity at our clients. Our team performs initial triage and full Cyber Kill Chain + MITRE ATT&CK analysis as part of our investigations.
· Our goal is to protect our clients from cyberattacks. As part of our team, you will work with our expert security staff to help us achieve this!
About The Role:
· Binary Defense is actively recruiting SOC Analyst Interns to work as part of our 24x7x365 SOC. Our SOC is 100% Remote. You will be provided with equipment to work remotely and will receive training on our clients, processes, and technologies.
· This role utilizes 10-hour shifts which are scheduled as 4 days on, 3 days off. All shifts run Sunday – Wednesday or Wednesday – Saturday. Shift start times vary.
· Candidates must be willing to perform shift-based work, allow for flexible scheduling, and demonstrate intuitive problem-solving and investigative skills. After a training period, SOC Analyst Interns will work collaboratively with the SOC to monitor/investigate security alerts, follow procedures for investigation/escalation, and interface with our clients as needed.
· SOC Analysts should have familiarity with current threats, vulnerabilities, and attack trends.
Role Responsibilities:
Note: This is not meant to be a comprehensive list of all role responsibilities.
· Actively monitor and investigate security alerts to detect malicious activity at our clients during your shift in our 24x7x365 SOC.
· Engage in training related to Cyber Kill Chain and MITRE ATT&CK analysis and eventually utilize these frameworks as part of their investigations into incoming security alerts.
· Follow documented procedures to properly triage and respond to identified malicious activity, such as escalation or remediation actions.
· Provide our clients with clear/concise written investigations within the Binary Defense service management system.
· Communicate and collaborate with Binary Defense clients through the lifecycle of all escalated security investigations.
· Participate in internal meetings, such as shift turn over, team meetings, etc. to collaborate with your fellow team members and perform knowledge transfer.
· Perform regular training to stay sharp on the latest technologies, methodologies, etc. (Binary Defense will sponsor this training).
Be a team player and interface regularly with your shift mates and colleagues.
· United States Citizen and reside within the Continental United States.
· One or more Cybersecurity certifications (not required, but preferred)
· Excellent written and oral communication skills
· Previous work or classroom experience with Security Information Event Management (SIEM) platforms, such as:
o AlienVault USM Anywhere [or] Appliance
o Splunk
o IBM QRadar
o Microsoft Sentinel
o Etc…
· Previous work or classroom experience with Endpoint Protection platforms, such as:
CrowdStrike
Carbon Black
SentinelOne
Cybereason
Etc…
· Willingness to learn and continually improve skills.