Location: Remote
Employment Type: Full-Time | 24/7 Support Environment
Compensation: $750 – $1000 USD per month (based on experience)
About the Role
We are seeking an experienced SOC Analyst (Level 3) to join our growing cybersecurity team. This role will play a key part in building and operating a 24×7 Security Operations Center (SOC), focusing on advanced threat detection, incident response, and continuous improvement of our cybersecurity posture.
You’ll collaborate with the SOC Manager and cross-functional teams to enhance detection and response capabilities, automate workflows, and maintain compliance with industry standards such as ISO 27001, SOC 2, and NIST CSF.
Key Responsibilities
- Deploy, configure, and maintain SOC tools including SentinelOne EDR, Wazuh SIEM, Splunk, and IBM QRadar.
- Monitor and analyze alerts from endpoints, networks, and cloud environments, ensuring accurate detection and validation of potential threats.
- Lead incident triage, containment, remediation, and post-incident analysis for escalated cases.
- Integrate telemetry and API feeds from firewalls, servers, and other sources for unified visibility.
- Develop and maintain SOC runbooks, playbooks, and workflows aligned with best practices.
- Collaborate with the SOC Manager to enhance detection, response, and reporting processes.
- Coordinate with IT operations teams for system patching, hardening, and remediation.
- Build and maintain dashboards and reports to track SOC performance and incident metrics.
- Mentor and guide Level 1 and Level 2 analysts, providing escalation support and training.
- Participate in threat hunting, forensic analysis, and automation initiatives to improve SOC efficiency.
- Ensure all SOC activities comply with relevant security and compliance frameworks.
Required Qualifications & Skills
- 3–5 years of hands-on experience in SOC operations, incident response, or cybersecurity engineering.
- Strong working knowledge of EDR and SIEM tools (SentinelOne, Wazuh, Splunk, QRadar, or equivalent).
- Practical experience with log analysis, correlation, and security integrations.
- Solid understanding of Windows/Linux event logs, MITRE ATT&CK, and network protocols.
- Exposure to automation or scripting (PowerShell, Python, or Bash) is preferred.
- Excellent analytical, problem-solving, and communication skills.
- Bachelor’s degree in Computer Science, Cybersecurity, or Information Technology (Master’s preferred).
- Certifications such as CEH, CompTIA Security+, or CySA+ are advantageous.
What We Offer
- 100% remote work in a dynamic, global security team.
- Opportunities to work with advanced SOC technologies and continuous learning support.
- Exposure to international compliance and cybersecurity standards.
- Competitive compensation based on experience and qualifications.
Job Type: Full-time
Pay: Rs200,000.00 - Rs280,000.00 per month
Application Question(s):
- Do you have experience managing 24/7 operations/security teams?
- How familiar are you with SOC, NIST, and CIS frameworks?
- Indicate the security tools you have hands-on experience
- Are you familiar with compliance standards such as ISO 27001, GDPR, HIPAA, or similar regional regulations?
- Do you have experience with scripting/automation (Python, PowerShell, or SOAR tools)?
- How much is your expected salary in USD?
Experience:
- IT operations & security: 6 years (Required)