Logo for Commit

SOC Analyst

Key Facts

Remote From: 
Full time
Senior (5-10 years)
English

Other Skills

  • Incident Reporting
  • Report Writing
  • Non-Verbal Communication

Roles & Responsibilities

  • 1+ years of hands-on experience in SOC / Security Operations
  • Hands-on experience with EDR tools (CrowdStrike, SentinelOne, or Microsoft Defender for Endpoint)
  • Familiarity with SIEM platforms (Splunk, Microsoft Sentinel, QRadar, or similar)
  • Fluent English (written and spoken) with excellent client-facing communication skills

Requirements:

  • Monitor security alerts from SIEM, EDR, and cloud platforms
  • Perform initial triage and classification of alerts as true or false positives
  • Investigate suspicious activities across endpoints, identities, and cloud environments
  • Escalate confirmed incidents to Tier 2 / Incident Response teams with proper context

Job description

Description

We’re looking for a Tier 1 SOC Analyst to join our team and handle initial triage, monitoring, and investigation of security alerts across cloud and endpoint environments.

This is a client-facing role requiring strong English, excellent verbal communication skills, and the ability to clearly communicate findings and escalations. The position is intended for candidates with at least 1 year of hands-on SOC / Security Operations experience.

The role is based on morning shifts aligned with US working hours, 08:00–17:00 US time.

Key Responsibilities:

  • Monitor security alerts from SIEM, EDR, and cloud platforms
  • Perform initial triage and classification of alerts as true or false positives
  • Investigate suspicious activities across endpoints, identities, and cloud environments
  • Escalate confirmed incidents to Tier 2 / Incident Response teams with proper context
  • Analyze logs from multiple sources, including CloudTrail, Azure Activity Logs, OS logs, and other relevant security data sources
  • Document findings clearly in tickets and investigation reports
  • Follow existing playbooks and contribute to improving detection logic over time
  • Communicate clearly with internal teams and clients regarding alerts, findings, and escalations


Requirements

Required Qualifications:

  • 1+ years of experience in SOC / Security Operations
  • Hands-on experience with EDR tools such as CrowdStrike, SentinelOne, or Microsoft Defender for Endpoint
  • Familiarity with SIEM platforms such as Splunk, Microsoft Sentinel, QRadar, or similar
  • Understanding of networking basics, including IP, DNS, HTTP/S, ports, and related concepts
  • Basic knowledge of Linux and Windows operating systems
  • Ability to analyze logs and identify suspicious behavior
  • Fluent English, both written and spoken — mandatory
  • Excellent verbal communication skills, especially in client-facing situations

Preferred Qualifications:

  • Experience with cloud environments such as AWS, Azure, or GCP
  • Knowledge of GCP / Google Cloud Platform — significant advantage
  • Ability to investigate cloud activity, including IAM, API calls, and resource changes
  • Understanding of identity-based attacks, such as token abuse and privilege escalation
  • Experience with scripting in Python or Bas

Nice to Have:

  • Experience with threat hunting
  • Knowledge of MITRE ATT&CK


Related jobs

Other jobs at Commit

We help you get seen. Not ignored.

We help you get seen faster — by the right people.

🚀

Auto-Apply

We apply for you — automatically and instantly.

Save time, skip forms, and stay on top of every opportunity. Because you can't get seen if you're not in the race.

AI Match Feedback

Know your real match before you apply.

Get a detailed AI assessment of your profile against each job posting. Because getting seen starts with passing the filters.

Upgrade to Premium. Apply smarter and get noticed.

Upgrade to Premium

Join thousands of professionals who got noticed and hired faster.