Skip to main content

12757 SOC 2 Analyst

Our client is seeking a SOC 2 Analyst who will be responsible for providing security monitoring services to client companies by performing basic event analysis, handling of common issue types, and basic incident response activities.


• Perform real-time security monitoring for potential security incidents and health alerts.
• Maintain accurate records of the security incidents in the case management system, managing
security incidents throughout their lifecycle to closure.
• Respond to security alerts, customer inquiries, and requests related to our services.
• Perform analysis of incoming alerts and coordinate response with senior analysts.
• Follow documented procedures for the SOC such as case handling procedure, alert handling
procedures, and customer-specific procedures to perform triage of potential security incidents.
• Continuously improve services by identifying and correcting issues or gaps in knowledge and
• Generate reports from various tools to provide to clients.
• Maintain small number of internal assets (troubleshooting, software installation, patching, etc.).
• Support onboarding clients into our Managed Security Services such as SOC service, Vulnerability
Scanning, MDR Service, etc.
• Monitor and maintain security tools for internal use and for customers.
• Engage in technical problem solving across multiple technologies.

• Seek constant improvement, more efficient, and less expensive ways and means in work
• Maintain a high level of accuracy in daily activities.
• Perform special projects and other miscellaneous duties as assigned by management, including
supporting ad-hoc data and investigation requests.
• Report all irregular issues and problems to management for resolution.
• Maintain high ethical standards in the work place.
• Maintain good communication with management, office staff members, and outside contacts.
• Comply with all company policies and procedures, including maintaining a clean and safe working
• Provide technical support in pre-sales and post-sales activities including customer visits.

Qualifications / Education & Work Experience
• At least 1 year of experience as an SOC analyst, including event triage and incident management
• Five or more years of work experience in IT field.
• Bachelor’s degree in a relevant field of study (e.g. Cybersecurity, Information Systems, Computer Science, Security & Risk Management, etc.).
• Previous experience in design, documentation, provisioning and installation of network security
devices (Firewall, IDS/IPS, WAF, etc) and Servers (Linux/Windows)
• Basic network and Internet knowledge (TCP/IP, LAN/WAN, Routing, HTTP, DNS, SMTP, etc) and strong interest in IT security
• Self-motivated and good experience troubleshooting IT issues.
• Fluent in English, both written and verbal, with excellent oral and written communication skills
Tools & Equipment
• Software includes the use of Windows operating system, MS Office
• General office equipment including phones, fax, copier, personal computer, printer, scanner, etc.


• MCSE, MCP, CCNA, Security +, strongly preferred
• CISSP, GIAC, CISA, strongly preferred

– At least 1 years of experience as a SOC analyst, incident response experience, etc.
– About 5 years of IT experience.
– Experience installing network security devices (FW, IDS/IPS, etc.) and servers (Linux/Windows, etc.)
– Working Hours:    Minimum of 8 hours per day. Work is shift-based and rotated.
-Weekend work is required 2-3 times per month. If you work weekends, you may take a compensatory day off on another day.

Job Category: IT
Job Location: Irvine CA

Apply for this position

Allowed Type(s): .pdf, .doc, .docx