Binary Defense is actively recruiting SOC Analyst Interns to work as part of our 24x7x365 SOC. Our SOC is 100% Remote. You will be provided with equipment to work remotely and will receive training on our clients, processes, and technologies.
This role utilizes 10-hour shifts which are scheduled as 4 days on, 3 days off. All shifts run Sunday – Wednesday or Wednesday – Saturday. Shift start times vary.
Candidates must be willing to perform shift-based work, allow for flexible scheduling, and demonstrate intuitive problem-solving and investigative skills. After a training period, SOC Analyst Interns will work collaboratively with the SOC to monitor/investigate security alerts, follow procedures for investigation/escalation, and interface with our clients as needed.
SOC Analysts should have familiarity with current threats, vulnerabilities, and attack trends.
Responsibilities
· Actively monitor and investigate security alerts to detect malicious activity at our clients during your shift in our 24x7x365 SOC.
· Engage in training related to Cyber Kill Chain and MITRE ATT&CK analysis and eventually utilize these frameworks as part of their investigations into incoming security alerts.
· Follow documented procedures to properly triage and respond to identified malicious activity, such as escalation or remediation actions.
· Provide our clients with clear/concise written investigations within the Binary Defense service management system.
· Communicate and collaborate with Binary Defense clients through the lifecycle of all escalated security investigations.
· Participate in internal meetings, such as shift turn over, team meetings, etc. to collaborate with your fellow team members and perform knowledge transfer.
· Perform regular training to stay sharp on the latest technologies, methodologies, etc. (Binary Defense will sponsor this training).
· Be a team player and interface regularly with your shift mates and colleagues.
· United States Citizen and reside within the Continental United States.
· One or more Cybersecurity certifications (not required, but preferred)
· Excellent written and oral communication skills
· Previous work or classroom experience with Security Information Event Management (SIEM) platforms, such as:
o AlienVault USM Anywhere [or] Appliance
o Splunk
o IBM QRadar
o Microsoft Sentinel
o Etc…
· Previous work or classroom experience with Endpoint Protection platforms, such as:
o CrowdStrike
o Carbon Black
o SentinelOne
o Cybereason
o Etc…
· Willingness to learn and continually improve skills.
About Binary Defense
Binary Defense is a trusted leader in security operations, supporting companies of all sizes to proactively monitor, detect and respond to cyberattacks. The company offers a personalized Open XDR approach to Managed Detection and Response, advanced Threat Hunting, Digital Risk Protection, Phishing Response, and Incident Response services, helping customers mature their security program efficiently and effectively based on their unique risks and business needs.
With a world-class 24/7 SOC, deep domain expertise in cyber, and sophisticated technology, hundreds of companies across every industry have entrusted Binary Defense to protect their business. Binary Defense gives companies actionable insights within minutes not hours, the confidence in their program to be resilient to ever-changing threats, and the time back that matters most to their business.
Binary Defense is also the Trusted Cybersecurity Partner of the Cleveland Browns and partners with PGA TOUR players. For more information, visit our website, check out our blog, or follow us on LinkedIn.
Binary Defense offers competitive medical, dental and vision coverage for employees and dependents, a 401k match which vests every payroll, a flexible and remote friendly work environment, as well as training opportunities to expand your skill set (to name a few!). If you’re interested in joining a growing team with great perks, we encourage you to apply!
Brown & Brown Insurance
TierPoint
Deutsche Postbank Group
HiveMQ
Huntress