About Company
Unleash your potential safeguarding digital frontiers with Career.zycto, a dynamic force in cybersecurity innovation. We are passionately committed to building robust defenses against evolving threats, empowering our team to push boundaries in protecting critical infrastructure and data. Career.zycto thrives on a culture of continuous learning, collaboration, and proactive problem-solving, making it the ideal environment for a driven SOC Analyst to hone their skills. Here, your vigilance directly contributes to a safer digital world, challenging you with complex security puzzles and celebrating your impactful contributions to our collective mission.
Job Description
Career.zycto is seeking a highly motivated and skilled Security Operations Center (SOC) Analyst to join our fully remote team. As a SOC Analyst, you will be on the front lines, playing a critical role in detecting, analyzing, and responding to cyber threats that impact our infrastructure and clients. This position offers a unique opportunity to work with cutting-edge security technologies and methodologies, contributing directly to the integrity and resilience of our digital assets from anywhere in Manville Heights, Iowa City.
In this pivotal role, you will be responsible for continuous monitoring of security systems, analyzing logs, identifying suspicious activities, and escalating security incidents to senior analysts or incident response teams. You will utilize your expertise in various security tools, including Security Information and Event Management (SIEM) platforms, to detect anomalies and potential breaches. A keen eye for detail, strong analytical skills, and a proactive approach to cybersecurity are essential for success in this role. We believe in empowering our team members with continuous learning opportunities and support for professional development, ensuring you stay ahead in the ever-evolving threat landscape. If you are passionate about cybersecurity, possess a strong desire to protect digital environments, and thrive in a dynamic, remote work setting, we encourage you to apply and become a key player in our mission to secure the future.
Key Responsibilities
- Perform 24/7 (on-call rotation) monitoring and initial triage of security alerts and events from various security tools (SIEM, EDR, IDS/IPS, WAF).
- Conduct in-depth analysis of security incidents to determine scope, impact, and root cause.
- Develop, implement, and fine-tune security detection rules and playbooks within SIEM platforms to improve threat detection capabilities.
- Collaborate with incident response teams during major security incidents, providing timely and accurate information.
- Document security incidents, remediation steps, and contribute to incident response knowledge base.
- Stay current with the latest cybersecurity threats, vulnerabilities, and attack methodologies.
- Participate in vulnerability assessment and penetration testing efforts, providing insights from a monitoring perspective.
- Contribute to the continuous improvement of SOC processes, tools, and technologies.
- Provide recommendations for enhancing the overall security posture based on threat intelligence and incident analysis.
Required Skills
- 2+ years of experience in a Security Operations Center (SOC) or similar cybersecurity role.
- Proficiency with SIEM platforms (e.g., Splunk, QRadar, Elastic, Azure Sentinel) for log analysis and alert management.
- Strong understanding of network protocols (TCP/IP, DNS, HTTP, etc.) and common network services.
- Knowledge of common attack vectors, security vulnerabilities, and defensive techniques.
- Experience with various operating systems (Windows Server, Linux/Unix) and their security configurations.
- Familiarity with scripting languages (e.g., Python, PowerShell) for automation and analysis.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to convey complex technical information clearly.
- Ability to work independently and as part of a remote, distributed team.
Preferred Qualifications
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Relevant industry certifications such as CompTIA Security+, CySA+, CEH, SANS GIAC certifications.
- Experience with cloud security principles and platforms (AWS, Azure, GCP).
- Familiarity with threat intelligence platforms and frameworks (MITRE ATT&CK).
- Experience with Endpoint Detection and Response (EDR) or Extended Detection and Response (XDR) solutions.
- Knowledge of forensic analysis techniques and tools.
Perks & Benefits
- Competitive salary and comprehensive benefits package.
- Generous paid time off, including vacation, sick leave, and holidays.
- Health, dental, and vision insurance coverage.
- Opportunities for professional development, training, and certification reimbursement.
- Flexible remote work environment.
- Home office stipend to support your remote setup.
- A collaborative and supportive team culture focused on innovation and continuous learning.
- Employee assistance program and wellness initiatives.
- Clear pathways for career advancement within a growing cybersecurity firm.
How to Apply
Interested candidates are encouraged to click on the application link below to submit their resume and a cover letter detailing their relevant experience and interest in this role. Please highlight your experience as a SOC Analyst and your ability to thrive in a remote work environment.
