SOC Analyst - Tier 1 | 3rd Shift | IN HOUSE
Job Description
Job Description
SOC Analyst - Tier 1 3rd Shift | IN-HOUSE Please note: This is NOT a remote positionMiami Lakes, FL - Local Candidates Only We are seeking a highly skilled and driven SOC Analyst to join our cybersecurity operations team. This is not just another monitoring role — this is an opportunity to defend critical infrastructure, regulated industries, and enterprise environments against evolving cyber threats. As a SOC Analyst, you will be on the front lines of cyber defense, actively monitoring, analyzing, and responding to incidents across diverse client environments. You’ll work hands-on with leading SIEM platforms such as USM, Microsoft Sentinel, and CrowdStrike, while also leveraging the power of Azure security services.
If you thrive under pressure, have a passion for hunting threats, and are eager to continuously sharpen your skills in a high-paced, growth-focused environment, we want you on our team.
Key Responsibilities
- Actively monitor, analyze, and respond to security events during the overnight shift, ensuring 24x7x365 coverage for our clients.
- Investigate and resolve security incidents from detection to remediation with precision, documenting findings and escalating when necessary.
- Collaborate with fellow SOC analysts, engineers, and stakeholders to improve detection logic, workflows, and incident response playbooks.
- Perform deep analysis of logs, alerts, and threat data across SIEM platforms (USM, Sentinel, CrowdStrike) and Azure environments to identify malicious activity.
- Support the deployment, tuning, and optimization of security tools and processes to enhance operational effectiveness.
- Stay ahead of the curve by researching and applying the latest threat intelligence, attacker TTPs, and defense strategies.
Qualifications & Skills
- Proven experience in a SOC or cybersecurity operations role with a strong track record in incident detection and response.
- Hands-on expertise with at least one enterprise SIEM platform (USM, Microsoft Sentinel, CrowdStrike).
- Familiarity with Azure security and administration, including monitoring and configuration best practices.
- Strong understanding of threat actors, attack techniques (MITRE ATT&CK), and mitigation strategies.
- Analytical mindset with exceptional problem-solving skills and the ability to operate independently during critical events.
- Excellent communication skills, both written and verbal, for clear incident reporting and cross-team collaboration.
What We Offer
- Competitive compensation with benefits tailored to support long-term career growth.
- A stable overnight schedule ideal for night-owl professionals who excel in 24x7 SOC operations.
- A collaborative, growth-driven culture that values skill development, innovation, and teamwork.
- Opportunities to work with cutting-edge technologies, frameworks, and enterprise environments.
- The chance to make a real-world impact by protecting regulated industries, critical infrastructure, and organizations across the Americas.