Search

SOC Analyst - Tier 1 | 3rd Shift | IN HOUSE

Infosight, Inc.
locationHialeah, FL 33016, USA
PublishedPublished: 6/14/2022
Healthcare
Full Time

Job Description

Job Description
SOC Analyst - Tier 1 3rd Shift | IN-HOUSE Please note: This is NOT a remote positionMiami Lakes, FL - Local Candidates Only We are seeking a highly skilled and driven SOC Analyst to join our cybersecurity operations team. This is not just another monitoring role — this is an opportunity to defend critical infrastructure, regulated industries, and enterprise environments against evolving cyber threats. As a SOC Analyst, you will be on the front lines of cyber defense, actively monitoring, analyzing, and responding to incidents across diverse client environments. You’ll work hands-on with leading SIEM platforms such as USM, Microsoft Sentinel, and CrowdStrike, while also leveraging the power of Azure security services.

If you thrive under pressure, have a passion for hunting threats, and are eager to continuously sharpen your skills in a high-paced, growth-focused environment, we want you on our team.
Key Responsibilities

  • Actively monitor, analyze, and respond to security events during the overnight shift, ensuring 24x7x365 coverage for our clients.
  • Investigate and resolve security incidents from detection to remediation with precision, documenting findings and escalating when necessary.
  • Collaborate with fellow SOC analysts, engineers, and stakeholders to improve detection logic, workflows, and incident response playbooks.
  • Perform deep analysis of logs, alerts, and threat data across SIEM platforms (USM, Sentinel, CrowdStrike) and Azure environments to identify malicious activity.
  • Support the deployment, tuning, and optimization of security tools and processes to enhance operational effectiveness.
  • Stay ahead of the curve by researching and applying the latest threat intelligence, attacker TTPs, and defense strategies.

Qualifications & Skills

  • Proven experience in a SOC or cybersecurity operations role with a strong track record in incident detection and response.
  • Hands-on expertise with at least one enterprise SIEM platform (USM, Microsoft Sentinel, CrowdStrike).
  • Familiarity with Azure security and administration, including monitoring and configuration best practices.
  • Strong understanding of threat actors, attack techniques (MITRE ATT&CK), and mitigation strategies.
  • Analytical mindset with exceptional problem-solving skills and the ability to operate independently during critical events.
  • Excellent communication skills, both written and verbal, for clear incident reporting and cross-team collaboration.

What We Offer

  • Competitive compensation with benefits tailored to support long-term career growth.
  • A stable overnight schedule ideal for night-owl professionals who excel in 24x7 SOC operations.
  • A collaborative, growth-driven culture that values skill development, innovation, and teamwork.
  • Opportunities to work with cutting-edge technologies, frameworks, and enterprise environments.
  • The chance to make a real-world impact by protecting regulated industries, critical infrastructure, and organizations across the Americas.


Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...