Binary Defense, headquartered in Stow, Ohio, is a rapidly growing cybersecurity software and services firm with solutions that include SOC-as-a-Service, proprietary Managed Detection & Response software, Security Information & Event Management and Counterintelligence. Our expert security staff helps shield businesses from cyberattacks.
Named a Cleveland Plain Dealer Top Workplace in 2020 and a top 10 software developer in Northeast Ohio by Crain’s, Binary Defense is a fast-paced business that enjoys a relaxed culture and on-site perks. The company was named to the Inc. 5000 fastest-growing companies list for 2019 and 2020 and is among the top 25 in the Cleveland Metro Market. At the Greater Cleveland Partnership’s “Best of Tech Awards,” Binary Defense was recognized as the “Tech Company of the Year” and “Best Tech Services Company” in Northeast Ohio.
Binary Defense (BD) has open positions for incident responders and network security monitoring analysts in a 24x7x365 Security Operations Center (SOC). Responsibilities will include, but not be limited to network security analysis, monitoring and incident response.
Security Analysts work with and learn from experienced security team leaders and use the latest technology to detect, analyze and limit intrusions and security events. Candidates must be willing to work in a 24x7x365 SOC environment, demonstrate intuitive problem solving skills and allow for flexible scheduling.
The SOC Analyst will work collaboratively to detect and respond to information security incidents, maintain and follow procedures for security event alerting, and participate in security investigations. The SOC Analyst will perform tasks including monitoring, research, classification and analysis of security events that occur on the network or endpoint. The SOC Analyst should have familiarity with the principals of network and endpoint security, current threat and attack trends, and have a working knowledge of security principals such as defense in depth.
The SOC Analyst must be competent to work at a high technical level and be capable of identifying threats, and threat vectors that cause security events.
Shift: 12:00 pm-12:00 am, 4 days on, 4 days off
QUALIFICATIONS, EDUCATION and CORE COMPETENCY REQUIREMENTS