Match score not available

SOC Analyst

fully flexible
Remote: 
Full Remote
Experience: 
Junior (1-2 years)
Work from: 

Offer summary

Qualifications:

Bachelor’s degree in Cybersecurity or related field, 1+ years of experience in security incidents, Relevant cybersecurity certifications preferred, Familiarity with SIEM/EDR platforms.

Key responsabilities:

  • Conduct initial triage and incident analysis
  • Collaborate with stakeholders on alert trends
MorganFranklin Consulting logo
MorganFranklin Consulting Large https://morganfranklin.com/
501 - 1000 Employees
See more MorganFranklin Consulting offers

Job description

Why Work Here?

MorganFranklin Consulting is a management advisory firm that works with leading businesses and government to address complex and transformational finance, technology, cybersecurity, and business objectives.

MorganFranklin’s cybersecurity practice helps clients across the globe to solve their most critical cybersecurity needs. From consulting and implementation to managed services and project resourcing, we work to safeguard assets by identifying risks, developing, and maturing cybersecurity programs, and implementing solutions that support and meet business goals.

Custom tailored and business-aligned service offerings include:

  • Strategy and GRC
  • Cybersecurity Operations
  • Identity & Access Management
  • Incident Response & Risk Intelligence
  • Application Security
  • Managed Security Services Provider

This is a Vaco employment opportunity aligned to MorganFranklin’s cybersecurity offering (Vaco LLC, dba “MorganFranklin Cyber”).

Learn what it means to truly own your career and be a part of a growing organization with a big, bold future.

SOC Analyst

We are seeking a Security Operations Center Analyst to be an integral part of our Cyber FusionCenter, providing 24/7 Advanced Threat Detection and Response for our customers.

You Will

  • Provide initial triage process, conducting in-depth analysis of security-related incidents using datafrom various sources, and communicating findings in a clear, digestible manner for both technicaland non-technical stakeholders.
  • Support key stakeholders throughout the incident response process, providing detailed analysisfrom initial detection to root cause identification.
  • Identify alert trends and collaborate with key stakeholders to enhance our Advanced Detectionand Response Capabilities.

Qualifications

  • Bachelor’s degree in Cybersecurity or a related field, or equivalent experience in internal securityoperations or MSSP environments.
  • 1+ years of experience responding to security-related incidents.
  • Certifications such as Security+, CySA+, GCIA, or other relevant cybersecurity credentials.
  • Experience with Splunk, Azure Sentinel, CrowdStrike, Defender, and other SIEM/EDR platforms.
  • Understanding of the initial triage process and incident reporting.
  • Knowledge of threat actor tactics and attack life cycles.
  • Technical writing and reporting skills.
  • Experience in creating and updating runbooks and workflow documentation.
  • Demonstrated communication and collaboration abilities, working effectively with both internalteams and external partners.
  • Active participation in the cybersecurity community, such as contributing to blogs or attendingannual conferences.

Required profile

Experience

Level of experience: Junior (1-2 years)
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Collaboration
  • Communication

Related jobs