FIND INTERNSHIPS

Soc Analyst (Tier 1–3)

Posted on Nov. 14, 2025 by CYBRILL

  • Remote, United States of America
  • $29.0 - $50.0
  • temporary, contract

Soc Analyst (Tier 1–3)

SOC Analyst (Multiple Levels: Tier 1–3)

Company Overview

CYBRILL is a leading provider of high-value cybersecurity consulting services, specializing in advanced Splunk architecture, engineering, and expert troubleshooting. Our team has extensive experience working with federal and state government agencies as well as commercial clients, ensuring flawless implementations and deployments.

Position Overview

We are seeking SOC Analysts to join our Cyber Defense team. Candidates will be placed across Tier 1, Tier 2, or Tier 3 based on experience, skills, and expertise.
As a SOC Analyst, you will monitor, investigate, and respond to security events using modern SIEM, EDR, and cloud-native security technologies across diverse client environments.

Responsibilities

Responsibilities will vary depending on experience level and assigned tier, but may include:

Security Monitoring & Analysis

  • Monitor SIEM, EDR, and security telemetry for indicators of compromise
  • Perform log analysis, event correlation, and anomaly detection
  • Identify, analyze, and escalate security incidents

Incident Response & Threat Detection

  • Conduct investigations into suspicious activity or confirmed incidents
  • Execute containment and remediation steps as appropriate
  • Develop incident documentation, reports, and recommendations

Threat Hunting & Advanced Operations (for experienced analysts)

  • Perform proactive threat hunts across enterprise datasets
  • Develop detection rules, dashboards, and custom SIEM queries
  • Collaborate on tuning and optimizing SIEM/SOAR pipelines
  • Support forensic triage, malware analysis, and root cause investigations

Collaboration & Continuous Improvement

  • Work closely with engineering teams on detection engineering and log ingestion
  • Contribute to SOC playbooks, runbooks, and process enhancements
  • Mentor junior analysts (for senior-level hires)

Required Qualifications (Depending on Level)

You will be considered for Tier 1, 2, or 3 based on the following areas:

Foundational Skills (Tier 1+)

  • Understanding of cybersecurity fundamentals (threats, vulnerabilities, attack vectors)
  • Familiarity with SIEM tools (Splunk, Sentinel, Elastic, Devo, etc.)
  • Strong analytical and communication skills
  • Ability to work within a fast-paced SOC environment
  • Must be a U.S. Citizen

Mid-Level Skills (Tier 2+)

  • Hands-on SOC or security operations experience
  • Proficiency in incident investigation and IR processes
  • Experience with EDR, cloud logs, threat intelligence, or packet analysis
  • Strong knowledge of MITRE ATT&CK and detection methodologies

Senior-Level Skills (Tier 3)

  • 5+ years SOC/IR/threat hunting experience
  • Expertise in SIEM engineering, detection writing, and data analysis
  • Experience with Splunk SPL, KQL, Elastic queries, scripting, or automation
  • Ability to lead major investigations and complex incident response activities
  • Experience with Cribl or pipeline engineering is a plus

Preferred Certifications (Any Level)

  • CompTIA Security+, CySA+
  • GCIH, GCIA, GCFE, GCFA, GCTI, GCED
  • Microsoft SC-200, Splunk Core, or Elastic certifications

(Not required but highly beneficial.)

Job Types: Temporary, Contract

Pay: $29.41 - $50.00 per hour

Expected hours: 20 – 40 per week

Benefits:

  • Flexible schedule

Work Location: Remote


Advertised until:
Dec. 14, 2025


Are you Qualified for this Role?


Click Here to Tailor Your Resume to Match this Job


Share with Friends!

Similar Internships


No similar Intern Jobs at the Moment!