1 month ago

SOC Investigation Analyst

Crossing Hurdles

Remote
Contractor
$120,000
Remote
Apply

Job Overview

Job TitleSOC Investigation Analyst
Job TypeContractor
Offered Salary$120,000
LocationRemote

Who's the hiring manager?

Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Uncover Hiring Manager

Job Description

About the Role: SOC Investigation Analyst

Crossing Hurdles is seeking a highly skilled SOC Investigation Analyst to join its Talent Network. This remote position offers flexible commitment of 10–40 hours/week, focusing on critical security operations and incident response.

Role Responsibilities

  • Review, monitor, and evaluate SOC alerts and investigation outputs based on predefined scenarios and criteria.
  • Distinguish true positives from false positives by validating investigative evidence and alert context.
  • Perform end-to-end security investigations including log analysis, entity pivoting, timeline reconstruction, and evidence correlation.
  • Assess the correctness, completeness, and quality of SOC investigations produced by automated or human workflows.
  • Apply consistent investigative judgment and recognize multiple valid investigation paths.
  • Make binary determinations while producing detailed ground-truth investigations when required.
  • Use Splunk to pivot across logs, entities, and timelines and reason about SPL queries.
  • Maintain clear and accurate documentation of investigative steps, assumptions, evidence, and conclusions.
  • Collaborate with program leads and other expert annotators to uphold investigation and annotation standards.
  • Mentor or support other analysts where applicable.

Requirements

  • Hands-on experience as a SOC analyst in a production SOC environment.
  • Strong understanding of alert triage, incident investigation workflows, and evidence-based decision-making.
  • Hands-on experience with Splunk including conducting investigations and reasoning about SPL queries.
  • Ability to pivot between logs, entities, and timelines.
  • Proven ability to evaluate SOC investigations and determine validity of conclusions.
  • Strong investigative judgment and ability to make decisive evaluations.
  • Fluent English with strong documentation and communication skills.
  • Experience with Endpoint Detection & Response (EDR) tools such as CrowdStrike Falcon, Microsoft Defender for Endpoint, or SentinelOne.
  • Experience analyzing cloud security logs such as AWS, Azure, or GCP.
  • Familiarity with Identity & Access Management (IAM) platforms such as Okta or Microsoft Entra ID.
  • Experience with email security tools like Proofpoint or Mimecast.
  • SOC leadership or mentoring experience.
  • Basic scripting experience (Python or similar).
  • Security certifications such as GCIA, GCIH, GCED, Splunk certifications, Security+, CCNA, or cloud security certifications.

Application Process

The application process for the SOC Investigation Analyst role is streamlined and efficient, taking approximately 20 minutes:

  • Upload resume
  • Interview (15 min)
  • Submit form

Key skills/competency

  • SOC analysis
  • Splunk
  • Incident investigation
  • Log analysis
  • Endpoint Detection & Response (EDR)
  • Cloud security
  • Identity & Access Management (IAM)
  • Security certifications
  • Scripting (Python)
  • Threat detection

Tags:

SOC Investigation Analyst
SOC analysis
incident investigation
log analysis
alert triage
threat detection
evidence correlation
security documentation
investigative judgment
security standards
mentoring
Splunk
CrowdStrike Falcon
Microsoft Defender for Endpoint
SentinelOne
AWS
Azure
GCP
Okta
Proofpoint
Python

Share Job:

How to Get Hired at Crossing Hurdles

  • Research Crossing Hurdles' culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor. Understand their approach to cybersecurity and talent networks to align your application.
  • Tailor your SOC Investigation Analyst resume: Highlight hands-on Splunk experience, incident investigation, log analysis, and EDR/cloud security tool proficiency. Customize your bullet points to directly address the job requirements and use keywords like "Splunk queries," "incident response," and "threat detection."
  • Prepare for a focused 15-minute interview: Given the short interview, practice concise answers demonstrating your SOC analysis expertise, investigative judgment, and problem-solving skills. Be ready to discuss specific examples of past investigations.
  • Showcase your technical depth: Be prepared to discuss your experience with Splunk, EDR tools like CrowdStrike, cloud security logs (AWS/Azure), and scripting (Python). Emphasize your ability to distinguish true positives and perform evidence correlation.
  • Highlight communication and documentation skills: As clear documentation is key, be ready to provide examples of how you maintain accurate records of investigations and collaborate effectively within a security team.

Frequently Asked Questions

Find answers to common questions about this job opportunity

Explore similar opportunities that match your background