SOC Analyst- Tier 2

Miami, Florida, United States

Kaseya® is the leading provider of complete IT infrastructure and security management solutions for Managed Service Providers (MSPs) and internal IT organizations worldwide. Kaseya’s best-in-breed technologies allow organizations to efficiently manage and secure IT to drive sustained business success. Kaseya has achieved sustained, strong double-digit growth over the past several years and is backed by Insight Venture Partners www.insightpartners.com), a leading global private equity firm investing in high-growth technology and software companies that drive transformative change in the industries they serve.

Founded in 2000, Kaseya currently serves customers in over 20 countries across a wide variety of industries and manages over 15 million endpoints worldwide. To learn more about our company and our award-winning solutions, go to www.Kaseya.com and for more information on Kaseya’s culture, please click here: Kaseya Culture.

Kaseya is not your typical company. We are not afraid to tell you exactly who we are and our expectations. We have achieved record levels of success being BOLD, being GRITTY, being ACCOUNTABLE. The thousands of people that succeed at Kaseya are prepared to go above and beyond for the betterment of our customers, and the betterment of their careers and long-term financial wealth. 

SOC Tier 2 – Miami, FL  

Are you ready to make an impact? 

WHAT YOU’LL DO: 

As a Tier 2 SOC Analyst, your role is pivotal in enhancing the security posture of our organization. You'll leverage your expertise to monitor and analyze security events, investigate incidents, and provide advanced threat detection and response. Collaborating closely with Tier 1 analysts and other security teams, you'll triage and escalate security incidents as necessary, ensuring timely resolution and minimizing impact. Your responsibilities include fine-tuning detection mechanisms, developing playbooks, and conducting thorough forensic analysis to identify root causes and mitigate future risks. Additionally, you'll contribute to continuous improvement initiatives by providing insights and recommendations based on your findings. Your proactive approach and technical proficiency are crucial in safeguarding our systems and data against evolving cyber threats. 

WHAT WE ARE LOOKING FOR: 

We are seeking a skilled Tier 2 SOC Analyst to join our team at RocketCyber. The ideal candidate will possess a strong background in cybersecurity and experience in incident detection, analysis, and response. Key attributes include proficiency in security monitoring tools, the ability to analyze and interpret security logs, and a proactive mindset in identifying and mitigating security threats. Excellent communication skills and the ability to collaborate effectively with cross-functional teams are essential. The ideal candidate should also demonstrate a commitment to staying updated on emerging threats and technologies to ensure our organization remains resilient against cyber threats. 

ESSENTIAL DUTIES AND RESPONSIBILITIES: 

  • Monitor, Analyze and Triage systems and events across Windows, macOS and Linux in a 24x7 operations environment in support of Tier I analysts OR independently review, assess, and act. 
  • Identify suspicious/malicious activity spanning Firewalls, Office 365 & Azure AD. 
  • Perform deep-dive incident analysis by correlating data from various sources and determine if a critical system is affected.  
  • Perform static and dynamic malware analysis. 
  • Perform offensive and defensive testing in virtual environments. 
  • Perform incident detection, response & remediation, threat hunting, digital forensics, and configure alerting rules. 
  • Identify and propose areas for improvement. 
  • Work independently and have a strong attention to detail and excellent documentation skills. 
  • Manage and delegate tasks to other team members. 

  

WHAT YOU’LL BRING:      

  • Masters in Cybersecurity, Management and Information Systems, Information Technology, Computer Science, or other related fields OR 2+ years of relevant SOC work experience and a Bachelor’s degree. 
  • CEH, CySA+, eJPT, PNPT, OSCP, CISSP (one or more). 
  • Knowledge of security technologies such as SIEM, SOAR, EDR, FW, IPS/IDS, Sandboxes. 
  • Knowledge of various firewalls, syslog, and other network log formats. 
  • Knowledge of network and common cryptographic protocols. 
  • Scripting experience with PowerShell, Bash, Java, Python or C++ 
  • Have excellent written and verbal communication skills. 
  • Ability to work non-standard work hours including nights and weekends. 
  • Must be authorized to work within the US and pass a background check. 

 

YOUR REWARD:  

Join the fastest growing tech company in the US. Earn a competitive compensation package that allows you to focus your attention on your passion for an exciting career in tech!  

If this sounds like the right career to fit your personality and interests, please apply, we are looking forward to meeting you! 

 Join the Kaseya growth rocket ship! 

 

Join the Kaseya growth rocket ship and see how we are #ChangingLives !

Additional information
Kaseya provides equal employment opportunity to all employees and applicants without regard to race, religion, age, ancestry, gender, sex, sexual orientation, national origin, citizenship status, physical or mental disability, veteran status, marital status, or any other characteristic protected by applicable law.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Azure Bash C CEH CISSP Computer Science EDR Firewalls Forensics IDS IPS IT infrastructure Java Linux MacOS Malware Monitoring OSCP PowerShell Python Scripting SIEM SOAR SOC Threat detection Windows

Perks/benefits: Competitive pay Equity Startup environment Team events

Region: North America
Country: United States
Job stats:  9  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.