SOC Analyst I

Sentinel Blue
6dRemote

About The Position

The Sentinel Blue Security Operations Center (Overwatch Team) is seeking a SOC Analyst I to serve as the first line of defense against cyber adversaries, responsible for real-time monitoring, initial triage, and performing root-cause analysis of security events. Here, we do more than react. We engage. We are seeking a proactive analyst who is eager to investigate suspicious alerts, sift through the noise and correlate data, validate threats, and prioritize remediation. The ideal candidate values a desire to learn, improve, and foster team collaboration. In this role, there is opportunity for growth beyond mere ticket closure, gaining exposure and skills in other cybersecurity domains (ie. Threat Intelligence, Threat Hunting, Digital Forensics and Incident Response (DFIR), Vulnerability Management, and Detection Engineering). This is a full-time, entry-level position–perfect for recent graduates or those pivoting into cybersecurity for experience, who demonstrate a keen interest in the field. Must be open to and willing to work a shift schedule. You will be surrounded by a passionate team and culture that takes pride in our work, our core values, and a pursuit of excellence in protecting our client’s data and assets in a multi-tenant cloud environment. This is a full-time position that is fully remote. Due to the nature of our work, you must be a U.S. citizen with eligibility for a clearance. No exceptions. What We Can Offer: Sentinel Blue is a young company with a focused mission: we’re bringing enterprise-class cybersecurity to small and medium sized businesses. Frankly, we’re pushing the envelope of how things are done and constantly seeking innovative ways to meet that mission. The pace is fast, and we’re always learning new things. This is a great place if you want to expose yourself to new and emerging technologies, want to be challenged, and want to build your skills. Further, success in this role can quickly transition into a team leadership role. The right person will find themselves in a fun, dynamic environment, working on interesting problems and making a real difference. You will be required to achieve a Security+ certification in the first 2 months of hire; we’ll cover your certification costs and provide paid time for you to study!

Requirements

  • U.S. citizenship - by nature of our work with the defense industry, all employees must be eligible for a Secret clearance.
  • Minimum of 0-2 years of experience in a Security Operations Center and/or a combination of experience in IT Support, Networking, or System Administration.
  • CompTIA Security+ certification is required within the first 2 months of hire.
  • Log Analysis: Familiarity with and ability to parse different types of logs – identity, network, firewall, web proxy, Sysmon, Windows Events, etc. to look for Indicators of Compromise (IOCs).
  • Operating Systems: Familiarity with Windows, macOS, and Linux.
  • Phishing Analysis: Evaluate header information, authentication protocols, malicious URLs and attachments, and inspect content for signs of social engineering and/or spoofing.
  • Threat Enrichment: Utilize Open Source Intelligence (OSINT) tools and internal threat intel feeds to check reputation of suspicious file hashes, IP addresses, domains, and URLs.
  • Frameworks: Understanding of the MITRE ATT&CK Framework and Cyber Kill Chain stages.
  • Networking: Knowledge of common ports, OSI and TCP/IP models, key protocols (TCP/UDP, DNS, HTTP/HTTPS), network segmentation, packets, VPNs, and firewalls.
  • Basic Malware Analysis: Understanding of static and dynamic analysis of malicious files.
  • Basic Cryptography: Ability to identify type of base encoding, cipher schemes, and understanding of hashing, digital signatures, and encryption/decryption.
  • Reporting: Ability to explain and translate technical findings or concepts to a general audience.
  • Common Attacks: Ability to recognize tactics, techniques, and procedures (TTPs) of common attacks, such as credential attacks, malware, phishing, ransomware, insider threat, Denial-of-Service, code injection, etc.
  • Querying and Scripting: Familiarity with and ability to use querying languages (e.g. Kusto Query Language) and/or PowerShell.

Nice To Haves

  • Associate’s or Bachelor’s degree in Cybersecurity, Information Systems, Computer Science, or a related technical field.
  • CompTIA Security+, GIAC Security Essentials (GSEC), Security Blue Team Level 1 (BTL1), and/ or Microsoft Security Operations Analyst (SC-200).
  • Professional portfolio of projects: e.g. Github, article write-ups, home labs, etc.
  • Participation in Capture-the-Flag (CTF) competitions, hackathons, bug bounties, and/or holds a high ranking on a platform (e.g. top 10% in Hack the Box).

Responsibilities

  • Continuously monitor the Security Information and Event Management (SIEM) dashboard and leverage security tools to detect potential security incidents and anomalies in real-time.
  • Analyze incoming alerts to determine their relevance and urgency; effectively distinguish between false and true positives to prioritize response efforts.
  • Conduct investigations by gathering context and other relevant logs to understand scope of alert.
  • Strictly adhere to established Service Level Agreements (SLAs), Incident Response (IR) playbooks and Standard Operating Procedures (SOPs) to ensure consistent and compliant handling of security events.
  • Create, update, and manage tickets in our case management system, ensuring all investigative steps, communications, and findings are thoroughly documented.
  • Identify and escalate complex or high-severity incidents to Tier II or Incident Response Team, providing clear details and a comprehensive summary of initial findings.
  • Perform basic remediation actions, such as blocking indicators and isolating compromised hosts, when authorized by SOPs or directed by senior personnel.
  • Demonstrate excellent verbal and written communication skills, when communicating with team members, clients, and/or stakeholders.
  • Contribute to the team’s knowledge base, creating or updating articles, SOPs, and/or playbooks when new trends or resolution methods are identified.

Benefits

  • Fully paid individual healthcare, vision and dental insurance for the employee.
  • Paid certification and training opportunities.
  • Three weeks of paid vacation + 10 paid holidays.
  • A supportive environment with a focus on keeping healthy work-life balance.
  • Retirement benefit (401k) with company match.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service