SOC Analyst – Remote

New Job Opportunity
We are actively hiring for a new role.
Apply Now
🏢 Hiring.zycto📍 Harvard Square, Cambridge💼 Full-Time💻 Remote🏭 Cybersecurity, Information Technology💰 85,000 - 125,000 per year

About Company

⚠ Job Safety Notice: We actively monitors listings to prevent scams, misleading, or unauthorized postings in line with PhishFort anti-phishing policies. If you spot a suspicious listing, submit a Job Takedown Request immediately for review and appropriate removal action.

Protecting digital frontiers is our passion at Hiring.zycto. We’re a forward-thinking cybersecurity firm dedicated to safeguarding organizations against ever-evolving threats. For a SOC Analyst, this means an environment rich with complex challenges, cutting-edge tools, and a collaborative spirit. We empower our team to innovate, learn, and make a tangible impact from anywhere. Join us and leverage your expertise in a supportive, high-impact remote setting where your contributions directly enhance our clients’ security posture and your professional growth is actively nurtured. We value proactive problem-solvers who thrive on tackling the next big security puzzle.

Job Description

Hiring.zycto is actively seeking a highly motivated and experienced Remote SOC Analyst to join our dynamic and distributed cybersecurity team. In this pivotal role, you will be on the front lines, defending our clients against sophisticated cyber threats from the comfort of your home office. We are looking for an individual with a keen eye for detail, a proactive mindset, and a deep understanding of security operations. This position offers a unique opportunity to work with cutting-edge security technologies, respond to critical incidents, and contribute to the continuous improvement of our security posture.

As a Remote SOC Analyst, you will play a crucial part in monitoring, detecting, analyzing, and responding to security incidents across diverse client environments. You’ll be instrumental in protecting sensitive data and critical infrastructure, working closely with a team of seasoned cybersecurity professionals. This is more than just a monitoring role; it’s an opportunity to apply your analytical skills to dissect complex security events, perform forensic analysis, and develop effective countermeasures. We value continuous learning and provide ample resources for professional development to ensure you stay ahead in the rapidly evolving threat landscape. If you are passionate about cybersecurity, thrive in a challenging yet supportive remote environment, and are ready to make a significant impact, we encourage you to apply.

Key Responsibilities

  • Perform 24/7 (on-call rotation potentially) security monitoring, triage, and analysis of security events from various security tools (SIEM, EDR, IDS/IPS).
  • Investigate security incidents, determine their scope and impact, and coordinate appropriate response actions.
  • Conduct threat hunting activities using threat intelligence, historical data, and security logs to proactively identify hidden threats.
  • Develop and refine security playbooks, procedures, and runbooks to enhance incident response capabilities.
  • Collaborate with cross-functional teams, including IT operations and engineering, to implement security controls and remediate vulnerabilities.
  • Maintain up-to-date knowledge of current cyber threats, attack vectors, and security technologies.
  • Contribute to vulnerability management, security assessments, and compliance initiatives.

Required Skills

  • 3+ years of experience in a Security Operations Center (SOC) or incident response role.
  • Proficiency with SIEM platforms (e.g., Splunk, Microsoft Sentinel, Elastic SIEM) for log analysis and correlation.
  • Strong understanding of networking protocols, operating systems (Windows, Linux), and cloud environments (AWS, Azure, GCP).
  • Experience with Endpoint Detection and Response (EDR) tools (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint).
  • Solid grasp of common attack techniques, tactics, and procedures (TTPs) and the MITRE ATT&CK framework.
  • Excellent analytical, problem-solving, and critical thinking skills.
  • Effective written and verbal communication skills for technical and non-technical audiences.

Preferred Qualifications

  • Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
  • Relevant industry certifications such as CompTIA Security+, CySA+, CEH, GIAC certifications (GCIH, GCIA).
  • Experience with scripting languages (e.g., Python, PowerShell) for automation and data analysis.
  • Familiarity with forensic methodologies and tools.
  • Previous experience working in a remote capacity.

Perks & Benefits

  • Competitive salary and performance-based bonuses.
  • Comprehensive health, dental, and vision insurance plans.
  • Generous paid time off (PTO) and company holidays.
  • 401(k) retirement plan with company matching.
  • Dedicated budget for professional development, certifications, and training.
  • Flexible remote work environment with a focus on work-life balance.
  • Access to cutting-edge security tools and technologies.
  • Collaborative and supportive team culture committed to innovation.

How to Apply

To seize this exciting opportunity and contribute your expertise to a leading cybersecurity firm, please click on the application link below. We look forward to reviewing your qualifications and potentially welcoming you to the Hiring.zycto team. Ensure your resume highlights your relevant SOC and incident response experience.

Job Application

×
Scroll to Top