Job details

You are in: Home » Jobs » Cyber Security Analyst

Job Details

Share this job

Cyber Security Analyst

  • Contract
  • Anywhere

SOC Analyst – Level 1 (CrowdStrike / Endpoint Security)
Contract Type
Contract (W2 or 1099/C2C)
Duration
3 months (likely extension)
Location
Remote (US-based)
Start Date
ASAP
Role Overview
We are seeking a Level 1 SOC Analyst to support a growing Security Operations Center (SOC), with a primary focus on monitoring and triaging CrowdStrike Falcon alerts across enterprise endpoint environments.
This role is ideal for an early-career security professional with hands-on experience in endpoint detection and response (EDR) who is looking to deepen their exposure to real-world incident handling, alert investigation, and escalation workflows.
Key Responsibilities

  • Monitor, triage, and respond to CrowdStrike Falcon alerts
  • Perform initial analysis to determine false positives vs true security incidents
  • Execute basic containment actions (e.g., endpoint isolation) following runbooks
  • Escalate confirmed or high-risk incidents to Level 2 / Incident Response teams
  • Create and maintain clear incident documentation and ticket updates
  • Work within defined SOC procedures, SLAs, and escalation paths
  • Collaborate with SOC peers across shift handovers
  • Support continuous improvement of alerting and response processes

Required Skills & Experience

  • 1+ year experience in a SOC, MDR, MSP, or security monitoring role
  • Hands-on experience with CrowdStrike Falcon (EDR)
  • Understanding of security alert triage and incident response fundamentals
  • Familiarity with endpoint security concepts (malware, ransomware, phishing, lateral movement)
  • Experience working with ticketing systems and documented workflows
  • Basic knowledge of Windows and/or Linux operating systems
  • Strong written communication and documentation skills

Nice to Have

  • Experience in a 24×7 SOC environment
  • Exposure to SIEM platforms (Splunk, Sentinel, QRadar, LogRhythm)
  • Understanding of the MITRE ATT&CK framework
  • Security certifications such as Security+, CrowdStrike CCFA, or similar
  • Previous experience supporting enterprise or regulated environments

What This Role Is Not

  • Not a threat-hunting or malware-research role
  • Not a senior incident responder position
  • Not a tool-only monitoring role – analysis and escalation judgment are required

Rate (Indicative)

  • $35-50/hr W2
  • $45-65/hr 1099 / C2C
    (Based on experience, shift pattern, and CrowdStrike depth)

 

Apply for Cyber Security Analyst

Upload your CV/resume or any other relevant file. Max. file size: 1 MB.
Please indicate that you have read and agree to our privacy policy