12 days ago

SOC Analyst

Keyrock

Hybrid
Full Time
€55,000
Hybrid

Job Overview

Job TitleSOC Analyst
Job TypeFull Time
CategoryCommerce
Experience5 Years
DegreeMaster
Offered Salary€55,000
LocationHybrid

Who's the hiring manager?

Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Uncover Hiring Manager

Job Description

About Keyrock

Since our beginnings in 2017, Keyrock has grown to be a leading change-maker in the digital asset space, renowned for our partnerships and innovation. Today, we boast over 200 team members globally, representing 42 nationalities, with backgrounds spanning from DeFi natives to PhDs. Predominantly remote, we maintain hubs in London, Brussels, Singapore, and Paris, fostering strong team cohesion through regular online and offline hangouts.

We actively trade on more than 80 exchanges and collaborate with a wide array of asset issuers. As an established market maker, our expertise has driven rapid expansion. Our services now encompass market making, options trading, high-frequency trading, OTC, and DeFi trading desks, alongside digital asset management. Keyrock is strategically expanding to become a full-service financial institution through both organic innovation and inorganic growth.

More than just a service provider, we are an initiator and pioneer. We lead the adoption of the Rust Development language for our algorithmic trading systems and champion its use industry-wide. We support Web3 startups through our Accelerator Program, enhance ecosystems by injecting liquidity into promising DeFi, RWA, and NFT protocols, and advance the industry through our research and governance initiatives. At Keyrock, we are not just envisioning the future of digital assets; we are actively building it.

Role Summary

As a SOC Analyst, you will serve as the first line of defense, monitoring, triaging, and escalating security alerts within Keyrock's cloud-first, high-availability trading environment. Your role involves diligently following established playbooks and runbooks to validate alerts, enrich investigations with crucial context, and ensure prompt escalation to Level 2 Incident Response teams.

What You’ll Do (Core Responsibilities)

  • 24/7 monitoring and alert triage across SIEM/EDR/cloud security tooling; accurately identify false positives versus credible threats and assign appropriate severity levels.
  • Conduct initial investigation and enrichment by gathering relevant logs/telemetry, adding context, and meticulously documenting findings within the case/ticketing system.
  • Ensure timely escalation and coordination of confirmed or suspected incidents to L2/IR teams, providing a complete handoff including timeline, scope, IOCs, and actions taken.
  • Execute runbooks and SOPs for common security events such as phishing, suspicious logins, endpoint detections, cloud key/token risks, malware alerts, and data exfiltration signals, including authorized containment actions.
  • Perform threat-aware analysis by mapping alerts to adversary behaviors (e.g., MITRE ATT&CK techniques) to enhance understanding and improve escalation quality.
  • Maintain operational hygiene through accurate shift handovers, updating watchlists and investigation notes, and identifying recurring alert patterns to recommend tuning improvements.

What We’re Looking For (Minimum Qualifications)

  • 0–2 years of experience in a SOC, security monitoring, or IT operations role, or equivalent hands-on experience gained through internships or labs.
  • Practical knowledge of fundamental security concepts including networking, DNS, HTTP(S), identity/authentication, and basic malware analysis.
  • Familiarity with log investigation and event triage methodologies.
  • Experience with common security tools and workflows, such including SIEM (Splunk/Elastic/Sentinel), EDR (CrowdStrike/Defender), ticketing systems (Jira/ServiceNow), or basic SOAR concepts.
  • Strong written communication skills, capable of producing clear, concise, and escalation-ready tickets and timelines.
  • Ability to work rotating shifts or on-call as required, including weekends and holidays, depending on the coverage model.

Nice To Have (Preferred)

  • Exposure to cloud security platforms (AWS/GCP/Azure), including experience with CloudTrail/Activity Logs, IAM analysis, and detection of token/key misuse.
  • Familiarity with incident response frameworks and processes, such as NIST incident response guidance.
  • Exposure to detection engineering concepts (e.g., rule tuning, false-positive reduction) or basic scripting skills (Python/Bash) for investigation automation.
  • Knowledge of the digital-asset ecosystem, including exchanges, custody concepts, and operational risks within 24/7 trading environments.
  • Relevant certifications such as Security+, Blue Team Level 1, SSCP, or equivalent practical training.

What Success Looks Like (First 60–90 Days)

  • Consistently make accurate triage decisions supported by strong documentation and clean escalations.
  • Maintain reliable shift handovers and achieve a measurable reduction in re-opened or incomplete cases.
  • Provide clear recommendations for detection and playbook improvements based on identified recurring patterns.

Why Keyrock

Work in a fast-moving, globally distributed environment that is actively shaping the future of digital financial markets. Join a culture that champions ownership, continuous learning, and constant improvement.

Key skills/competency

  • SIEM
  • EDR
  • Cloud Security
  • Incident Response
  • Threat Triage
  • Network Security
  • Endpoint Detection
  • Log Analysis
  • MITRE ATT&CK
  • Cybersecurity Operations

Tags:

SOC Analyst
Security Monitoring
Alert Triage
Incident Investigation
Threat Analysis
Runbook Execution
Log Analysis
Security Operations
Escalation
Documentation
Operational Hygiene
SIEM
EDR
Splunk
Elastic
Sentinel
CrowdStrike
Defender
Jira
ServiceNow
AWS
GCP
Azure
Python
Bash

Share Job:

How to Get Hired at Keyrock

  • Research Keyrock's culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor, especially their focus on digital assets and Web3.
  • Highlight relevant experience: Customize your resume to emphasize any SOC, security monitoring, or IT operations experience, including internships or hands-on labs.
  • Showcase security fundamentals: Prepare to discuss practical knowledge of networking, DNS, HTTP(S), identity/authentication, and basic malware concepts during interviews.
  • Detail tool familiarity: Be ready to demonstrate your experience with SIEM (Splunk/Elastic), EDR (CrowdStrike/Defender), and ticketing systems like Jira/ServiceNow.
  • Emphasize communication and availability: Practice clear, concise written and verbal communication for incident reporting, and confirm your ability to work rotating shifts and on-call.

Frequently Asked Questions

Find answers to common questions about this job opportunity

Explore similar opportunities that match your background