SOC Analyst – Detection & Response | AIIR – AI-driven Incident Response

4 years

0 Lacs

Posted:1 day ago| Platform: Linkedin logo

Apply

Work Mode

Remote

Job Type

Contractual

Job Description

Company Description

AiiR Response Inc. is the first AI-driven breach response and extortion management platform, designed to automate negotiations, investigations, and recovery. Our platform, powered by our virtual analyst CEIRA, streamlines ransom negotiations, tracks cryptocurrency payments, conducts forensic investigations, and automates breach notifications. We help reduce costs, speed up response times, and ensure compliance for cyber insurers, enterprises, legal teams, and cybersecurity teams. Embrace the future of breach response with AiiR.


Role Description

This is a remote contract role for a SOC Analyst – Detection & Response. As a SOC Analyst, you will be responsible for monitoring security alerts and events, conducting threat hunting, analyzing threats, and responding to security incidents. You will work closely with cybersecurity and threat intelligence teams to enhance our detection and response capabilities.


Qualifications

  • Experience in Cyber Threat Hunting (CTH) and Cyber Threat Intelligence (CTI)
  • Strong Analytical Skills and experience working in a Security Operations Center
  • In-depth knowledge of Cybersecurity principles and practices
  • Proactive problem-solving skills and ability to work independently
  • Relevant certifications such as CISSP, CISM, or CEH are a plus
  • Bachelor's degree in Cybersecurity, Information Technology, or related field


Responsibilities

  • Monitor SIEM/EDR platforms for security alerts and escalate confirmed incidents.
  • Conduct first and second-line investigation of suspicious activity.
  • Support forensic analysts with initial evidence collection and triage.
  • Perform detection tuning and rule creation to reduce false positives.
  • Carry out threat hunting exercises using IOCs and attacker TTPs.
  • Contribute to incident reports and recommend preventive measures.


Requirements

  • 2–4 years SOC or IR experience.
  • Familiarity with 

    Microsoft Sentinel, Splunk, Defender, CrowdStrike, or similar tools

    .
  • Experience correlating SOC alerts with forensic investigations.
  • Knowledge of MITRE ATT&CK and standard IR frameworks (NIST, ISO).
  • Basic scripting knowledge for automating SOC tasks.


Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now