Branch

Security Operations Analyst

Branch

full-time

Posted on:

Location Type: Remote

Location: Remote • North Carolina • 🇺🇸 United States

Visit company website
AI Apply
Apply

Salary

💰 $91,300 - $118,600 per year

Job Level

Mid-LevelSenior

Tech Stack

AWSCloudCyber SecurityFirewallsJamfSplunk

About the role

  • Monitor security tools, dashboards, and alerts (e.g., SIEM, EDR, IDS/IPS, firewalls) to identify suspicious activity.
  • Investigate security incidents and escalations, perform root cause analysis, and coordinate response efforts.
  • Work with CX and Account Managers on customer abuse cases and remediation.
  • Triage alerts and determine their severity, scope, and impact; escalate as appropriate.
  • Collect and preserve evidence for forensic analysis, reporting, and compliance.
  • Collaborate with IT, security engineers, and other business units to contain and remediate threats.
  • Support vulnerability management efforts by correlating vulnerability data with threat intelligence.
  • Maintain and improve playbooks, runbooks, and incident response processes.
  • Participate in threat hunting, red/blue team exercises, and tabletop drills.
  • Stay up to date with the latest cybersecurity trends, threat actors, and attack techniques.
  • Document incidents, findings, and lessons learned in a timely and accurate manner.

Requirements

  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field—or equivalent work experience.
  • 3–5 years + of experience in a security operations, incident response, or cybersecurity analyst role.
  • Familiarity with SOC environments and 24/7 monitoring models (preferred for larger organizations).
  • Experience with SIEM tools (e.g., Splunk, Rapid7, SumoLogic).
  • Familiarity with Mac endpoint protection platforms (e.g., Jamf, Kandji, Crowdstrike).
  • Understanding of networking, operating systems, cloud platforms (AWS), and security architecture.
  • Knowledge of common attack vectors, malware, phishing, and TTPs (MITRE ATT&CK framework).
  • Experience writing or maintaining incident response documentation or procedures.
  • Strong analytical, problem-solving, and troubleshooting skills.
  • Ability to work well under pressure during high-stakes incidents.
  • Excellent written and verbal communication skills.
  • Team-oriented with a proactive and detail-focused mindset.
Benefits
  • Health and wellness programs
  • Paid time off
  • Retirement planning options

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
SIEMEDRIDS/IPSfirewallsvulnerability managementincident responseforensic analysisnetworkingoperating systemscloud platforms
Soft skills
analytical skillsproblem-solvingtroubleshootingcommunication skillsteam-orientedproactive mindsetdetail-focusedability to work under pressure
Coalfire

Senior Technical Manager, SecOps

Coalfire
Seniorfull-time$94k–$163k / year🇺🇸 United States
Posted: 2 days agoSource: jobs.lever.co
AWSAzureCloudGoogle Cloud PlatformSplunk
QuartzBio, part of Precision for Medicine

Senior Director, Enterprise IT, SecOps

QuartzBio, part of Precision for Medicine
Seniorfull-time$203k–$305k / year🇺🇸 United States
Posted: 2 days agoSource: boards.greenhouse.io
AWSCloudCyber SecurityPMP
Precision For Medicine

Senior Director, Enterprise IT, SecOps

Precision For Medicine
Seniorfull-time$203k–$305k / year🇺🇸 United States
Posted: 2 days agoSource: boards.greenhouse.io
AWSCloudCyber SecurityPMP
Precision Medicine Group

Senior Director, Enterprise IT, SecOps

Precision Medicine Group
Seniorfull-time$203k–$305k / year🇺🇸 United States
Posted: 2 days agoSource: boards.greenhouse.io
AWSCloudCyber SecurityPMP