- Contract
- Anywhere
SOC Analyst – Level 1 (CrowdStrike / Endpoint Security)
Contract Type
Contract (W2 or 1099/C2C)
Duration
3 months (likely extension)
Location
Remote (US-based)
Start Date
ASAP
Role Overview
We are seeking a Level 1 SOC Analyst to support a growing Security Operations Center (SOC), with a primary focus on monitoring and triaging CrowdStrike Falcon alerts across enterprise endpoint environments.
This role is ideal for an early-career security professional with hands-on experience in endpoint detection and response (EDR) who is looking to deepen their exposure to real-world incident handling, alert investigation, and escalation workflows.
Key Responsibilities
- Monitor, triage, and respond to CrowdStrike Falcon alerts
- Perform initial analysis to determine false positives vs true security incidents
- Execute basic containment actions (e.g., endpoint isolation) following runbooks
- Escalate confirmed or high-risk incidents to Level 2 / Incident Response teams
- Create and maintain clear incident documentation and ticket updates
- Work within defined SOC procedures, SLAs, and escalation paths
- Collaborate with SOC peers across shift handovers
- Support continuous improvement of alerting and response processes
Required Skills & Experience
- 1+ year experience in a SOC, MDR, MSP, or security monitoring role
- Hands-on experience with CrowdStrike Falcon (EDR)
- Understanding of security alert triage and incident response fundamentals
- Familiarity with endpoint security concepts (malware, ransomware, phishing, lateral movement)
- Experience working with ticketing systems and documented workflows
- Basic knowledge of Windows and/or Linux operating systems
- Strong written communication and documentation skills
Nice to Have
- Experience in a 24×7 SOC environment
- Exposure to SIEM platforms (Splunk, Sentinel, QRadar, LogRhythm)
- Understanding of the MITRE ATT&CK framework
- Security certifications such as Security+, CrowdStrike CCFA, or similar
- Previous experience supporting enterprise or regulated environments
What This Role Is Not
- Not a threat-hunting or malware-research role
- Not a senior incident responder position
- Not a tool-only monitoring role – analysis and escalation judgment are required
Rate (Indicative)
- $35-50/hr W2
- $45-65/hr 1099 / C2C
(Based on experience, shift pattern, and CrowdStrike depth)
