About this role
Northern Technologies Group is hiring a SOC Analyst I (SOC Tier 1 Analyst) to monitor client security events, analyze alerts, triage incidents, and escalate complex cases to higher tiers. The role includes shift work across nights, weekends, and holidays to support 24/7/365 SOC operations.
Key Responsibilities
- Monitor security alerts and events
- Analyze and triage security incidents
- Perform initial investigation and containment
- Document incident timelines and artifacts
- Escalate incidents to Tier 2 or Tier 3 analysts
Technical Overview
You will monitor security alerts from SIEM, IDS/IPS, firewalls, and endpoint protection systems, then conduct initial investigations and containment. The job also requires Splunk-based security event monitoring and log analysis, as well as incident documentation and tracking through ticketing systems such as ServiceNow, Jira, and Microsoft Dynamics.
Ideal Candidate
The ideal candidate is a US-based SOC Tier 1 analyst with 2+ years of cybersecurity or Security Operations Center (SOC) experience. They can monitor SIEM alerts, perform incident triage and containment, document timelines and artifacts, escalate incidents appropriately, and use Splunk and ticketing systems (ServiceNow, Jira, Microsoft Dynamics) to track responses.
Must-Have Skills
2+ years of experience in cybersecuritySecurity Operations Center (SOC)or related information security rolesStrong understanding of cybersecurity principles and common attack vectorsMonitor security alerts and events generated by various security tools including SIEMIDS/IPSfirewallsand endpoint protection systemsAnalyze and triage security incidentsPerform initial investigation and containment of security incidentsDocument incident detailsEscalate complex incidents to Tier 2 or Tier 3 analystsUse ticketing systems to trackdocumentand escalate security incidentsSplunk for security event monitoringlog analysisand incident investigation
Tools & Platforms
SIEM (Security Information and Event Management)IDS/IPS (Intrusion Detection System / Intrusion Prevention System)firewallsendpoint protection systemsSplunkEDR (Endpoint Detection and Response)Microsoft DefenderCrowdStrikeSophosSentinelOneMicrosoft DynamicsServiceNowJira
Required Skills
Security Operations Center (SOC)SIEM (Security Information and Event Management)IDS/IPS (Intrusion Detection System / Intrusion Prevention System)firewallsendpoint protectionincident triageincident containmentincident documentationincident escalationSplunklog analysisincident investigationticketing systemsMicrosoft DynamicsServiceNowJiraEDR (Endpoint Detection and Response)Microsoft DefenderCrowdStrikeSophosSentinelOne
Hard Skills
Security Operations Center (SOC)security event monitoringalert triageincident escalationincident containmentincident documentationSIEM (Security Information and Event Management)IDS/IPS (Intrusion Detection System / Intrusion Prevention System)firewallsendpoint protection systemsproblem-solvingsecurity incident analysisclient incident communicationthreat and vulnerability awarenessSplunklog analysisincident investigationticketing systemsMicrosoft DynamicsServiceNowJiraEDR (Endpoint Detection and Response)Microsoft DefenderCrowdStrikeSophosSentinelOneUS citizenship requirement
Soft Skills
effective communicationability to convey technical information to technical and non-technical stakeholdersattention to detailcross-functional collaborationknowledge sharingtimely updates and communication to clientsteamwork
Certifications
Preferred
CompTIA Security+ISC2 Certified in Cybersecurity
Keywords for Your Resume
SOC Analyst ISOC Tier 1 AnalystSOC AnalystSecurity Operations Center (SOC)SIEMSecurity Information and Event ManagementIDS/IPSIntrusion Detection SystemIntrusion Prevention Systemfirewallsendpoint protectionEDREndpoint Detection and ResponseSplunkSplunk for security event monitoringlog analysisincident investigationincident triageincident escalationincident containmentSecurity incident documentationticketing systemsMicrosoft DynamicsServiceNowJiraCompTIA Security+ISC2 Certified in CybersecurityUS Citizen
Deal Breakers
Must be a US Citizen, Must have 2+ years of experience in cybersecurity, SOC, or related roles, Must demonstrate strong understanding of cybersecurity principles and common attack vectors
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile