Digital asset market makers building scalable, self-adaptive technologies to support efficient markets.
SOC Analyst, Level 1
Location
California + 4 moreAll locations: California, Florida, Illinois, New Jersey, New York
Posted
29 days ago
Salary
Not specified
Job Description
Job Requirements
- 0–2 years in a SOC / security monitoring / IT operations role (or equivalent hands-on experience, internships, labs).
- Practical knowledge of security fundamentals: networking, DNS, HTTP(S), identity/authentication, and malware basics.
- Familiarity with log investigation and event triage concepts.
- Familiarity with common security tools and workflows (any of the following): SIEM (Splunk/Elastic/Sentinel), EDR (CrowdStrike/Defender), ticketing (Jira/ServiceNow), basic SOAR concepts.
- Strong written communication: produce clear, escalation-ready tickets and timelines.
- Ability to work rotating shifts/on-call (as required), including weekends/holidays depending on coverage model.
Benefits
- Work in a fast-moving, globally distributed environment shaping the future of digital financial markets.
- A culture that expects ownership, learning, and continuous improvement.
Related Guides
Related Categories
Related Job Pages
More Security Operations Jobs
SOC Analyst I
Sentinel BlueEnterprise cybersecurity for small and medium businesses | Specialize in defense and federal | Ask us about CMMC/DFARS
SOC Analyst I monitoring security operations for Sentinel Blue
Security Operations Engineer
CalendlyThe scheduling automation platform for eliminating the back-and-forth emails to find the perfect time — and so much more
Security Operations Engineer at Calendly enhancing cybersecurity measures and incident response capabilities
Technical Senior Manager overseeing Security Operations at Coalfire
The role involves responding to security incidents, enhancing incident response processes, conducting investigations, and performing proactive threat hunting.