Match score not available

INTERNSHIP - Security Operations Center Analyst - REMOTE

extra holidays - extra parental leave
Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

United States Citizen residing within the Continental United States., Familiarity with cybersecurity concepts and current threats., Excellent written and oral communication skills., Previous experience with SIEM and Endpoint Protection platforms is preferred..

Key responsabilities:

  • Monitor and investigate security alerts in a 24x7x365 SOC environment.
  • Engage in training related to Cyber Kill Chain and MITRE ATT&CK analysis.
  • Follow procedures to triage and respond to identified malicious activity.
  • Communicate and collaborate with clients throughout the security investigation process.

Binary Defense logo
Binary Defense Computer Hardware & Networking SME https://www.binarydefense.com/
51 - 200 Employees
See all jobs

Job description

Job Type
Internship
Description

Binary Defense is actively recruiting SOC Analyst Interns to work as part of our 24x7x365 SOC. Our SOC is 100% Remote. You will be provided with equipment to work remotely and will receive training on our clients, processes, and technologies.


This role utilizes 10-hour shifts which are scheduled as 4 days on, 3 days off. All shifts run Sunday – Wednesday or Wednesday – Saturday. Shift start times vary.


Candidates must be willing to perform shift-based work, allow for flexible scheduling, and demonstrate intuitive problem-solving and investigative skills. After a training period, SOC Analyst Interns will work collaboratively with the SOC to monitor/investigate security alerts, follow procedures for investigation/escalation, and interface with our clients as needed.


SOC Analysts should have familiarity with current threats, vulnerabilities, and attack trends.


Responsibilities


· Actively monitor and investigate security alerts to detect malicious activity at our clients during your shift in our 24x7x365 SOC.

· Engage in training related to Cyber Kill Chain and MITRE ATT&CK analysis and eventually utilize these frameworks as part of their investigations into incoming security alerts.

· Follow documented procedures to properly triage and respond to identified malicious activity, such as escalation or remediation actions.

· Provide our clients with clear/concise written investigations within the Binary Defense service management system.

· Communicate and collaborate with Binary Defense clients through the lifecycle of all escalated security investigations.

· Participate in internal meetings, such as shift turn over, team meetings, etc. to collaborate with your fellow team members and perform knowledge transfer.

· Perform regular training to stay sharp on the latest technologies, methodologies, etc. (Binary Defense will sponsor this training).

· Be a team player and interface regularly with your shift mates and colleagues.

Requirements


· United States Citizen and reside within the Continental United States.

· One or more Cybersecurity certifications (not required, but preferred)

· Excellent written and oral communication skills

· Previous work or classroom experience with Security Information Event Management (SIEM) platforms, such as:

o AlienVault USM Anywhere [or] Appliance

o Splunk

o IBM QRadar

o Microsoft Sentinel

o Etc…

· Previous work or classroom experience with Endpoint Protection platforms, such as:

o CrowdStrike

o Carbon Black

o SentinelOne

o Cybereason

o Etc…

· Willingness to learn and continually improve skills.


About Binary Defense


Binary Defense is a trusted leader in security operations, supporting companies of all sizes to proactively monitor, detect and respond to cyberattacks. The company offers a personalized Open XDR approach to Managed Detection and Response, advanced Threat Hunting, Digital Risk Protection, Phishing Response, and Incident Response services, helping customers mature their security program efficiently and effectively based on their unique risks and business needs.


With a world-class 24/7 SOC, deep domain expertise in cyber, and sophisticated technology, hundreds of companies across every industry have entrusted Binary Defense to protect their business. Binary Defense gives companies actionable insights within minutes not hours, the confidence in their program to be resilient to ever-changing threats, and the time back that matters most to their business.


Binary Defense is also the Trusted Cybersecurity Partner of the Cleveland Browns and partners with PGA TOUR players. For more information, visit our website, check out our blog, or follow us on LinkedIn.


Binary Defense offers competitive medical, dental and vision coverage for employees and dependents, a 401k match which vests every payroll, a flexible and remote friendly work environment, as well as training opportunities to expand your skill set (to name a few!). If you’re interested in joining a growing team with great perks, we encourage you to apply!

Required profile

Experience

Industry :
Computer Hardware & Networking
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Teamwork
  • Problem Solving

Security Operations Center (SOC) Analyst Related jobs