SOC Analyst II

VectorUSASan Diego, CA
10h$125,000 - $145,000Onsite

About The Position

As a Security Operations Center (SOC) Analyst, you will serve as a critical part of our organization’s cyber defense team. You will continuously monitor security platforms, analyze events, investigate potential threats, and support incident response efforts aimed at protecting both internal infrastructure and client environments. This role is ideal for individuals who take initiative, enjoy hands‑on problem solving, and want to build real operational experience working active security events.

Requirements

  • 2+ years of experience in IT support, helpdesk, networking, or a security-related field (internships or school projects may qualify).
  • Basic understanding of cybersecurity principles, vulnerabilities, malware, and common attack vectors.
  • Familiarity with tools such as SIEM (e.g., Splunk, Sentinel etc.), EDR, firewalls, and ticketing systems.
  • Ability to examine logs, alerts, and system behavior to form hypotheses and document conclusions clearly.
  • Ability to analyze data, troubleshoot efficiently, and communicate clearly both verbally and in writing.
  • Applicants must be able to pass a background check and meet eligibility requirements for a security clearance, if required by project assignment.
  • U.S. citizenship may be required for certain federal enclave work.

Nice To Haves

  • Certifications such as CompTIA Security+, Network+, CISSP, CISM, or other credentials are not required, but may strengthen an application. Demonstrated practical experience, hands‑on skills, or relevant project work may be considered equally, or more valuable than formal certifications.
  • Hands-on experience with Windows/Linux systems.
  • Associate’s or Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field.
  • Familiarity with security best‑practice concepts, such as attack techniques, defensive controls, or common operational standards.
  • Experience performing basic threat hunting or using SIEM search queries to investigate anomalous activity is a plus.

Responsibilities

  • Monitor security alerts and logs from SIEM, EDR, firewalls, and other enterprise security systems.
  • Conduct triage of security events follow established SOC processes, escalation paths, and shift-handoff procedures with consistency.
  • Investigate suspicious behavior, phishing emails, malware indicators, and anomalies across identities, networks and endpoints.
  • Document investigations, maintain accurate ticketing records, and create incident summaries for senior staff.
  • Assist with threat intelligence review, enrichment of alerts, and correlation of Indicators of Compromise (IoCs).
  • Assist with tuning alert logic, identifying false positives, and suggesting improvements to playbooks and documentation.
  • Work side-by-side with senior analysts and IT teams to troubleshoot incidents, validate findings, and execute response actions according to established procedures.
  • Participate in shift rotations, weekend coverage, or on‑call schedules as required for 24x7 operations.

Benefits

  • Career development and training opportunities.
  • Hands-on experience with enterprise-level cybersecurity tools and environments.
  • Work with a collaborative, experienced, and growing security team.
  • Full benefits package including medical, dental, vision, 401(k), and paid time off.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service