As a SOC Investigative Analyst, you will review, monitor, and evaluate SOC alerts and investigation outputs based on predefined scenarios and criteria. You will also perform end-to-end security investigations and assess the correctness, completeness, and quality of SOC investigations produced by automated or human workflows.
Requirements
- 3+ years of hands-on experience as a SOC analyst in a production SOC environment (Tier 2 or above strongly preferred)
- Strong understanding of alert triage, incident investigation workflows, and evidence-based decision-making under time constraints
- Mandatory hands-on experience with Splunk, including conducting investigations and reasoning about SPL queries
- Fluent English (written and spoken) with strong documentation and communication skills
Benefits
- Competitive hourly rate of $70–$95/hour
- Opportunity to work with a leading AI research lab and elite creative and technical talent
- Chance to work with a global company with investors like Benchmark, General Catalyst, and Jack Dorsey
