Назад
Company hidden
23 часа назад

SOC Analyst (Cybersecurity)

Формат работы
remote (только USA)
Тип работы
fulltime
Грейд
junior
Английский
b1
Релокация
Serbia, Spain, Cyprus, Kazakhstan
Вакансия из списка Hirify.GlobalВакансия из Hirify RU Global, списка компаний с восточно-европейскими корнями
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

SOC Analyst (Cybersecurity): Monitoring, detecting, analyzing, investigating, and responding to cybersecurity threats, fraud attempts, and policy violations across multiple log sources with an accent on initial triage, classification of alerts, and managing SOC queues. Focus on investigating suspicious activity using SIEM and EDR platforms and improving detection rules by providing feedback.

Location: Flexible remote work is available worldwide, with relocation support to Cyprus, Spain, Serbia, or Kazakhstan for those interested in working from an office.

Company

hirify.global is a fintech company dedicated to challenging the status status quo of incumbent finances with an innovative spirit.

What you will do

  • Monitor security events across various log sources (AD, VPN, EDR, Cloud, SaaS) and identify anomalies.
  • Perform initial triage and classification of alerts according to SOC processes, playbooks, and SLAs.
  • Investigate suspicious activity using SIEM, EDR, and other security platforms to determine severity and impact.
  • Escalate incidents to L2/L3 teams with clear context, evidence, and recommendations.
  • Manage SOC queues in SIEM and Jira, ensuring timely response and consistent quality of analysis.
  • Document findings according to SOC standards and participate in cross-team communication.

Requirements

  • 1–2 years of experience in a security, IT operations, support, or monitoring role.
  • Good understanding of security monitoring concepts, log analysis, event flows, and networking basics.
  • Ability to recognize suspicious behavior such as failed logins, privilege escalation, and phishing indicators.
  • Strong analytical thinking, a structured approach to investigations, and attention to detail.
  • English B1+ required for working with documentation, tools, and international team members.
  • Willingness to learn and grow towards L2/L3 SOC Analyst roles (e.g., Incident Responder, Threat Hunter).

Nice to have

  • Experience with security monitoring systems or log analysis tools.
  • Basic scripting skills (e.g., Python, Bash) for simple automations.
  • Understanding of common attack techniques and threat patterns.
  • Experience with cloud platforms or modern IT infrastructures.
  • Ability to write or tune detections.

Culture & Benefits

  • A commitment to creativity and groundbreaking solutions with an innovative spirit.
  • Valuing open, transparent communication and honest feedback.
  • A strong, collaborative, and supportive team community.
  • Relocation support to one of our hubs (Cyprus, Spain, Serbia, or Kazakhstan), with assistance for the employee and their family.
  • Flexible work options from one of our offices or remote.
  • Comprehensive healthcare coverage.
  • Education budget for language lessons, professional training, and certifications.
  • Wellness budget for mental health and fitness activity reimbursements.
  • 20 days of annual leave and paid sick leave.

Будьте осторожны: если вас просят войти в iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →