Digital asset market makers building scalable, self-adaptive technologies to support efficient markets.
SOC Analyst, Level 2
Location
California + 4 moreAll locations: California, Florida, Illinois, New Jersey, New York
Posted
30 days ago
Salary
Not specified
Job Description
Job Requirements
- 2–5+ years of SOC / incident response / security operations experience (or equivalent hands-on experience in a fast-paced production environment).
- Strong ability to investigate across cloud security operations, endpoint security, identity, and core network fundamentals.
- Proficiency with at least one SIEM and common SOC tooling (e.g., Splunk/Elastic/Sentinel; CrowdStrike/Defender; Jira/ServiceNow).
- Ability to write clear incident documentation: timelines, scope, impact, containment actions, and recommended remediations.
- Comfort operating in an on-call or shift environment (depending on coverage model).
Benefits
- Remote work options
- Professional development opportunities
Related Guides
Related Categories
Related Job Pages
More Security Operations Jobs
SOC Analyst I
Sentinel BlueEnterprise cybersecurity for small and medium businesses | Specialize in defense and federal | Ask us about CMMC/DFARS
SOC Analyst I monitoring security operations for Sentinel Blue
Security Operations Engineer
CalendlyThe scheduling automation platform for eliminating the back-and-forth emails to find the perfect time — and so much more
Security Operations Engineer at Calendly enhancing cybersecurity measures and incident response capabilities
Technical Senior Manager overseeing Security Operations at Coalfire
The role involves responding to security incidents, enhancing incident response processes, conducting investigations, and performing proactive threat hunting.