Keyrock

Digital asset market makers building scalable, self-adaptive technologies to support efficient markets.

SOC Analyst, Level 1

Security OperationsSecurity OperationsFull TimeRemoteTeam 51-200Since 2017H1B No SponsorCompany SiteLinkedIn

Location

California + 4 moreAll locations: California, Florida, Illinois, New Jersey, New York

Posted

29 days ago

Salary

Not specified

EnglishCloudDNSService NowSplunk

Job Description

• 24/7 monitoring and alert triage across SIEM/EDR/cloud security tooling; identify false positives vs. credible threats and set appropriate severity. • Initial investigation and enrichment: gather relevant logs/telemetry, add context, and document findings clearly in the case/ticketing system. • Escalation and coordination: escalate confirmed/suspected incidents quickly and cleanly to L2/IR with a complete handoff (timeline, scope, IOCs, actions taken). • Runbook execution: follow SOPs for common events (phishing, suspicious logins, endpoint detections, cloud key/token risk, malware alerts, data exfiltration signals), including containment actions you’re authorized to perform. • Threat-aware analysis: map alerts to adversary behaviors (e.g., MITRE ATT&CK techniques) to improve understanding and escalation quality. • Operational hygiene: maintain accurate shift handovers, update watchlists and investigation notes, and identify recurring alert patterns for tuning recommendations.

Job Requirements

  • 0–2 years in a SOC / security monitoring / IT operations role (or equivalent hands-on experience, internships, labs).
  • Practical knowledge of security fundamentals: networking, DNS, HTTP(S), identity/authentication, and malware basics.
  • Familiarity with log investigation and event triage concepts.
  • Familiarity with common security tools and workflows (any of the following): SIEM (Splunk/Elastic/Sentinel), EDR (CrowdStrike/Defender), ticketing (Jira/ServiceNow), basic SOAR concepts.
  • Strong written communication: produce clear, escalation-ready tickets and timelines.
  • Ability to work rotating shifts/on-call (as required), including weekends/holidays depending on coverage model.

Benefits

  • Work in a fast-moving, globally distributed environment shaping the future of digital financial markets.
  • A culture that expects ownership, learning, and continuous improvement.

Related Categories

Related Job Pages

More Security Operations Jobs

SOC Analyst I

Sentinel Blue

Enterprise cybersecurity for small and medium businesses | Specialize in defense and federal | Ask us about CMMC/DFARS

Security Operations30 days ago
Full TimeRemoteTeam 11-50H1B No Sponsor

SOC Analyst I monitoring security operations for Sentinel Blue

United States
$50K - $60K / year

Security Operations Engineer

Calendly

The scheduling automation platform for eliminating the back-and-forth emails to find the perfect time — and so much more

Security Operations30 days ago
Full TimeRemoteTeam 501-1,000Since 2013H1B No Sponsor

Security Operations Engineer at Calendly enhancing cybersecurity measures and incident response capabilities

AWSCloudCyber SecurityFirewallsGoogle Cloud PlatformLinuxMacOSPythonSplunk
United States
$155.8K - $219.9K / year

Senior Technical Manager, Security Operations

Coalfire

Cyber solutions that move you forward, faster.

Security Operations30 days ago
Full TimeRemoteTeam 1,001-5,000Since 2001H1B Sponsor

Technical Senior Manager overseeing Security Operations at Coalfire

AWSAzureCloudGoogle Cloud PlatformSplunk
United States
$94K - $163K / year
Full TimeRemoteTeam 66Since 1994

The role involves responding to security incidents, enhancing incident response processes, conducting investigations, and performing proactive threat hunting.

AWSAzureCybersecurityEdrMitre Att&CkSIEM
Georgia