Job Overview
Job TitleSOC Investigation Analyst
Job TypeContractor
Offered Salary$120,000
LocationRemote
Who's the hiring manager?
Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Job Description
About the Role: SOC Investigation Analyst
Crossing Hurdles is seeking a highly skilled SOC Investigation Analyst to join its Talent Network. This remote position offers flexible commitment of 10–40 hours/week, focusing on critical security operations and incident response.
Role Responsibilities
- Review, monitor, and evaluate SOC alerts and investigation outputs based on predefined scenarios and criteria.
- Distinguish true positives from false positives by validating investigative evidence and alert context.
- Perform end-to-end security investigations including log analysis, entity pivoting, timeline reconstruction, and evidence correlation.
- Assess the correctness, completeness, and quality of SOC investigations produced by automated or human workflows.
- Apply consistent investigative judgment and recognize multiple valid investigation paths.
- Make binary determinations while producing detailed ground-truth investigations when required.
- Use Splunk to pivot across logs, entities, and timelines and reason about SPL queries.
- Maintain clear and accurate documentation of investigative steps, assumptions, evidence, and conclusions.
- Collaborate with program leads and other expert annotators to uphold investigation and annotation standards.
- Mentor or support other analysts where applicable.
Requirements
- Hands-on experience as a SOC analyst in a production SOC environment.
- Strong understanding of alert triage, incident investigation workflows, and evidence-based decision-making.
- Hands-on experience with Splunk including conducting investigations and reasoning about SPL queries.
- Ability to pivot between logs, entities, and timelines.
- Proven ability to evaluate SOC investigations and determine validity of conclusions.
- Strong investigative judgment and ability to make decisive evaluations.
- Fluent English with strong documentation and communication skills.
- Experience with Endpoint Detection & Response (EDR) tools such as CrowdStrike Falcon, Microsoft Defender for Endpoint, or SentinelOne.
- Experience analyzing cloud security logs such as AWS, Azure, or GCP.
- Familiarity with Identity & Access Management (IAM) platforms such as Okta or Microsoft Entra ID.
- Experience with email security tools like Proofpoint or Mimecast.
- SOC leadership or mentoring experience.
- Basic scripting experience (Python or similar).
- Security certifications such as GCIA, GCIH, GCED, Splunk certifications, Security+, CCNA, or cloud security certifications.
Application Process
The application process for the SOC Investigation Analyst role is streamlined and efficient, taking approximately 20 minutes:
- Upload resume
- Interview (15 min)
- Submit form
Key skills/competency
- SOC analysis
- Splunk
- Incident investigation
- Log analysis
- Endpoint Detection & Response (EDR)
- Cloud security
- Identity & Access Management (IAM)
- Security certifications
- Scripting (Python)
- Threat detection
How to Get Hired at Crossing Hurdles
- Research Crossing Hurdles' culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor. Understand their approach to cybersecurity and talent networks to align your application.
- Tailor your SOC Investigation Analyst resume: Highlight hands-on Splunk experience, incident investigation, log analysis, and EDR/cloud security tool proficiency. Customize your bullet points to directly address the job requirements and use keywords like "Splunk queries," "incident response," and "threat detection."
- Prepare for a focused 15-minute interview: Given the short interview, practice concise answers demonstrating your SOC analysis expertise, investigative judgment, and problem-solving skills. Be ready to discuss specific examples of past investigations.
- Showcase your technical depth: Be prepared to discuss your experience with Splunk, EDR tools like CrowdStrike, cloud security logs (AWS/Azure), and scripting (Python). Emphasize your ability to distinguish true positives and perform evidence correlation.
- Highlight communication and documentation skills: As clear documentation is key, be ready to provide examples of how you maintain accurate records of investigations and collaborate effectively within a security team.
Frequently Asked Questions
Find answers to common questions about this job opportunity
01What is the typical weekly time commitment for a SOC Investigation Analyst within the Crossing Hurdles Talent Network?
02What specific Splunk skills are essential for the SOC Investigation Analyst role at Crossing Hurdles?
03How quickly can I expect to complete the application process for the SOC Investigation Analyst position at Crossing Hurdles?
04What types of Endpoint Detection & Response (EDR) tools does Crossing Hurdles utilize for SOC investigations?
05Does the SOC Investigation Analyst role at Crossing Hurdles involve analyzing cloud security logs?
06What kind of security certifications are valued for the SOC Investigation Analyst role at Crossing Hurdles?
Explore similar opportunities that match your background