SOC Analyst (CAN)

Arctiq
Remote

About The Position

Arctiq is seeking multiple SOC Analysts at Tier 1 and Tier 2 levels to join our 24x7 security operations center. This role involves monitoring, triaging, investigating, and responding to security alerts for a diverse client base. The ideal candidate is analytical, curious, resilient, and thrives in a fast-paced environment, seeking exposure to various technologies and a deep commitment to customer protection.

Requirements

  • One or more years in an IT security role or IT support role with significant security responsibilities.
  • Working knowledge of core security concepts: TCP/IP, common protocols, Windows and Linux fundamentals, Active Directory / Entra ID, cloud (Azure / AWS / GCP) basics, and common attacker techniques.
  • Familiarity with at least one SIEM and one EDR/XDR platform.
  • Comfortable writing or modifying basic queries (KQL, SPL, or similar).
  • Demonstrated ability in effective communication and collaborating in a diverse high-performance team environment.
  • Strong commitment to customer service.
  • Must be legally authorized to work in the country where they reside.
  • Candidates must submit to a background examination.

Responsibilities

  • Continuously monitor and triage alerts and detections across SIEM, EDR/XDR, identity, email, network, and cloud telemetry for managed clients, applying severity classification and initial enrichment.
  • Investigate suspicious activity end-to-end, including validation, pivoting, and root-cause analysis, utilizing knowledge of attacker tradecraft, MITRE ATT&CK, and the cyber kill chain.
  • Execute documented response playbooks to contain threats, such as isolating hosts, disabling accounts, blocking indicators, and coordinating with client and engineering teams.
  • Partner with Detection Engineering to reduce noise, propose, test, and deploy new analytics, automations, and SOAR playbooks.
  • Maintain audit-grade documentation throughout every case in the ticketing and case-management system.
  • Consistently meet triage, investigation, and notification SLAs while maintaining high accuracy, low false-positive rates, and strong client satisfaction.
  • Drive continuous improvement of the SOC by feeding lessons learned back into detections, playbooks, runbooks, and knowledge-base articles.
  • Operate on an assigned shift (Day, Swing, or Night) within a 24x7 rotation, including weekends and holidays, and respond to on-call escalations as required.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service