12 days ago

SOC Analyst Level 1

Keyrock

Hybrid
Full Time
$80,000
Hybrid

Job Overview

Job TitleSOC Analyst Level 1
Job TypeFull Time
CategoryCommerce
Experience5 Years
DegreeMaster
Offered Salary$80,000
LocationHybrid

Who's the hiring manager?

Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Uncover Hiring Manager

Job Description

About Keyrock

Since our beginnings in 2017, Keyrock has emerged as a leading change-maker in the digital asset space. With over 200 team members from 42 nationalities, we operate predominantly remote with hubs in London, Brussels, Singapore, and Paris. We trade on more than 80 exchanges and provide services including market making, options trading, high-frequency trading, OTC, DeFi trading desks, and digital asset management. We are pioneers in adopting the Rust development language and support Web3 startups through our Accelerator Program.

Role Summary

As a SOC Analyst Level 1, you are the first line of defense for monitoring, triaging, and escalating security alerts in Keyrock’s cloud-first, high-availability trading environment. You will follow playbooks and runbooks to validate alerts, enrich investigations, and ensure timely escalation to Level 2/Incident Response.

Core Responsibilities

  • 24/7 monitoring and alert triage using SIEM/EDR and cloud security tools.
  • Conduct initial investigations by gathering logs, telemetry, and context.
  • Escalate confirmed incidents with clear documentation and complete handoff.
  • Execute runbooks for events such as phishing, suspicious logins, and malware alerts.
  • Map alerts to adversary behaviors like MITRE ATT&CK techniques.
  • Maintain operational hygiene with accurate shift handovers and watchlist updates.

Minimum Qualifications

0–2 years in a SOC, security monitoring, or IT operations role; practical knowledge of networking, DNS, HTTP(S), identity/authentication, and malware basics; familiarity with log investigations, SIEM and EDR tools, ticketing systems, and basic SOAR concepts; strong written communication for clear documentation; ability to work rotating shifts and on-call, including weekends and holidays.

Preferred Qualifications

Experience in cloud security (AWS/GCP/Azure), familiarity with incident response frameworks (e.g., NIST), exposure to detection engineering or basic scripting (Python/Bash), and knowledge of digital asset ecosystems. Certifications such as Security+, Blue Team Level 1, or SSCP are a plus.

What Success Looks Like (First 60–90 Days)

Success will be measured by consistently accurate triage decisions, strong documentation, reliable shift handovers, and clear recommendations for detection and playbook enhancements.

Key skills/competency

  • monitoring
  • triage
  • escalation
  • investigation
  • documentation
  • shift handovers
  • runbook execution
  • threat analysis
  • SIEM
  • EDR

Tags:

SOC Analyst Level 1
monitoring
triage
escalation
investigation
documentation
shift handovers
runbooks
threat analysis
alert validation
SIEM
EDR
cloud
Splunk
Elastic
CrowdStrike
Defender
Jira
ServiceNow
AWS

Share Job:

How to Get Hired at Keyrock

  • Customize your resume: Highlight security and SOC experience.
  • Research Keyrock: Understand their digital asset innovations.
  • Emphasize technical skills: Detail SIEM, EDR, and cloud security.
  • Prepare for behavioral interviews: Share examples of shift work and escalation.

Frequently Asked Questions

Find answers to common questions about this job opportunity

Explore similar opportunities that match your background