8194460 Job Detail
K

SOC Analyst - Tier 2

at Keeper Security, Inc.

Desired Skills

About Job

Lead end-to-end execution of complex DevOps and infrastructure programs, including perform in-depth triage and analysis of escalated alerts to determine scope, impact and root cause Lead response actions such as isolating hosts, revoking credentials or blocking network indicators Examine endpoint, network and cloud logs to reconstruct attack timelines and adversary behaviors Execute and enhance incident response playbooks, detection rules and escalation criteria Maintain operational command during assigned shifts, ensuring situational awareness, incident logging and proper shift handovers Conduct proactive threat hunting for suspicious activity and emerging indicators of compromise Validate data integrity from security tools (SIEM, EDR, IDS, etc.) and assist with tuning or integrations Partner with IT, DevSecOps and compliance teams to mitigate vulnerabilities and improve defenses Produce high-quality incident reports, lessons learned and recommendations for leadership

Requirements

Bachelor's degree in Cybersecurity, Computer Science or related field, or equivalent practical experience
2-4 years in a SOC, incident response or cyber defense role
Experience with SIEM platforms (e.g., Splunk, Sumo Logic, Sentinel) and EDR technologies
Strong understanding of MITRE ATT&CK, threat actor TTPs and multi-source log correlation
Hands-on experience analyzing network traffic, endpoint behavior and cloud telemetry
Familiarity with scripting for automation and analysis (Python, PowerShell or Bash)
Strong written and verbal communication skills for incident reporting and coordination

Additional Instructions

Lead end-to-end execution of complex DevOps and infrastructure programs, including perform in-depth triage and analysis of escalated alerts to determine scope, impact and root cause
Lead response actions such as isolating hosts, revoking credentials or blocking network indicators
Examine endpoint, network and cloud logs to reconstruct attack timelines and adversary behaviors
Execute and enhance incident response playbooks, detection rules and escalation criteria
Maintain operational command during assigned shifts, ensuring situational awareness, incident logging and proper shift handovers
Conduct proactive threat hunting for suspicious activity and emerging indicators of compromise
Validate data integrity from security tools (SIEM, EDR, IDS, etc.) and assist with tuning or integrations
Partner with IT, DevSecOps and compliance teams to mitigate vulnerabilities and improve defenses
Produce high-quality incident reports, lessons learned and recommendations for leadership

Perks and Benefits

Medical, Dental & Vision (inclusive of domestic partnerships)
Employer Paid Life Insurance & Employee/Spouse/Child Supplemental life
Voluntary Short/Long Term Disability Insurance
401K (Roth/Traditional)
A generous PTO plan that celebrates your commitment and seniority (including paid Bereavement/Jury Duty, etc)
Above market annual bonuses
K

Keeper Security, Inc.

Details

Job Type
Remote
Preferred location
USA
Apply Before
Jan 17, 2026
Apply To Job