Binary Defense is seeking a talented Tier 1 SOC Analyst to work as part of our 24x7x365 Security Operations Center team. Our SOC is 100% Remote. You will be provided with equipment to work remotely and will receive training on our clients, processes, and technologies.
PLEASE NOTE: The shift schedule for this position will be one of the following:
Sun - Wed, 9 PM - 7 AM Eastern
Wed - Sat, 12 AM - 10 AM Eastern
Responsibilities
- Actively monitor and investigate security alerts to detect malicious activity at our clients during your shift in our 24x7x365 SOC.
- Perform Cyber Kill Chain and MITRE ATT&CK analysis on incoming security alerts.
- Follow documented procedures to properly triage and respond to identified malicious activity, such as escalation or remediation actions.
- Provide our clients with clear/concise written investigations within the Binary Defense service management system.
- Communicate and collaborate with Binary Defense clients through the lifecycle of all escalated security investigations.
- Contribute to general security operations across all clients in the Binary Defense portfolio, whether through escalations, regular meetings, etc.
- Participate in internal meetings, such as shift turn over, team meetings, etc. to collaborate with your fellow team members and perform knowledge transfer.
- Perform regular training to stay sharp on the latest technologies, methodologies, etc. (Binary Defense will sponsor this training).
- Stay up-to-date on the latest vulnerabilities, threats, and attacks around the world.
- Be a team player and interface regularly with your shift mates and colleagues.
- Bachelor’s Degree in Cyber Security or equivalent work experience.
- Familiarity with the principals of network and endpoint security, current threats, vulnerabilities, and attack trends. Additionally, analysts should have a working knowledge of security principals and frameworks such as Cyber Kill Chain, MITRE ATT&CK, etc.
- SOC Analysts must be competent to work at a high technical level and be capable of identifying threats and attack vectors.
- One or more Cybersecurity certifications.
- Excellent written and oral communication skills
- Previous work or classroom experience with Security Information Event Management (SIEM) platforms, such as:
AlienVault USM Anywhere [or] Appliance, Splunk, IBM QRadar, Microsoft Sentinel, etc. - Previous work or classroom experience with Endpoint Protection platforms, such as:
CrowdStrike, Carbon Black, SentinelOne, Cybereason, etc. - Willingness to learn and continually improve skills.
About Binary Defense
Binary Defense is a trusted leader in security operations, supporting companies of all sizes to proactively monitor, detect and respond to cyberattacks. The company offers a personalized Open XDR approach to Managed Detection and Response, advanced Threat Hunting, Digital Risk Protection, Phishing Response, and Incident Response services, helping customers mature their security program efficiently and effectively based on their unique risks and business needs.
With a world-class 24/7 SOC, deep domain expertise in cyber, and sophisticated technology, hundreds of companies across every industry have entrusted Binary Defense to protect their business. Binary Defense gives companies actionable insights within minutes not hours, the confidence in their program to be resilient to ever-changing threats, and the time back that matters most to their business.
Binary Defense is also the Trusted Cybersecurity Partner of the Cleveland Browns and partners with PGA TOUR players. For more information, visit our website, check out our blog, or follow us on LinkedIn.
Binary Defense offers competitive medical, dental and vision coverage for employees and dependents, a 401k match which vests every payroll, a flexible and remote friendly work environment, as well as training opportunities to expand your skill set (to name a few!). If you’re interested in joining a growing team with great perks, we encourage you to apply!