×
Register Here to Apply for Jobs or Post Jobs. X

Security Operations Center; SOC Analyst

Remote / Online - Candidates ideally in
Cambria County, USA
Listing for: viLogics
Remote/Work from Home position
Listed on 2026-02-28
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager, IT Support, Network Security
Salary/Wage Range or Industry Benchmark: 70000 - 90000 USD Yearly USD 70000.00 90000.00 YEAR
Job Description & How to Apply Below
Position: Security Operations Center (SOC) Analyst

Position Overview

As a SOC Analyst at vi Logics, you are a front-line cyber defender operating within the Total Secure Office 365 (TSO 365) framework—our fully managed cybersecurity and IT services platform. In this MSSP (Managed Security Services Provider) environment, you will work alongside elite engineers to deliver continuous threat detection, incident response, and risk mitigation for our clients, across industries ranging from healthcare and education to manufacturing and state/local government.

This role requires deep analytical skills, collaborative instincts, and operational fluency in cloud, hybrid, and on-prem environments. Analysts must be comfortable supporting vi Logics’ proprietary Fast Track Cybersecurity Model, which includes fully integrated MDR/XDR, SIEM, SASE, PAM, and secure backup platforms.

Core Responsibilities Security Monitoring & Threat Detection
  • Monitor endpoints, servers, SaaS platforms (e.g., M365), and cloud workloads via vi Logics integrated MDR/XDR platform.
  • Analyze events from vi Logics' SIEM/SOAR environment and escalates based on criticality and workflows.
  • Apply threat intelligence feeds, MITRE ATT&CK mapping, and behavioral analytics to detect advanced persistent threats (APTs), ransomware, and zero‑day exploits.
Incident Triage & Response
  • Lead real‑time response to Tier 1 and Tier 2 security events using vi Logics' TSO toolkits, including playbook‑driven SOAR workflows.
  • Document incident reports with impact assessments and recommended mitigations; coordinate remediation with client IT teams or vi Logics’ Helpdesk.
  • Participate in post‑incident reviews, ensuring lessons learned are documented and improvements applied to IR playbooks.
Operational Excellence & Automation
  • Tune correlation rules, detection logic, and alert thresholds to align with client risk profiles and compliance requirements (HIPAA, CMMC, PCI, etc.).
  • Recommend improvements for automated containment workflows (quarantining hosts, revoking credentials, etc.).
  • Assist with purple team exercises and tabletop simulations facilitated under vi Logics’ cyber readiness engagements.
Client‑Facing Collaboration
  • Participate in monthly client briefings to review detected threats, trends, and security posture improvements.
  • Translate complex technical findings into executive‑level insights during client calls and compliance audits.
  • Provide risk prioritization to clients leveraging vi Logics’ Cyber Exposure Index and SaaS Alert integrations.
Toolsets You’ll Work With
  • SIEM/SOAR: vi Logics Internal SIEM/SOAR, Microsoft Sentinel, Splunk, Log Rhythm, Cortex XSOAR
  • EDR/XDR/MDR: vi Logics EDR, Sentinel One, Defender for Endpoint, Huntress, Crowd Strike (client‑dependent)
  • IAM/PAM:
    Threat Locker, Microsoft Entra  (Azure AD), Duo
  • Network Security: DNS Filtering, ZTNA, SASE Netskope, Prisma Access
  • Backup & DR:
    Veeam, Zerto, Rubrik, Air‑Gap Immutable Storage
  • Compliance Integrations: CISv8, NIST 800‑171, HIPAA, CMMC 2.0, PCI‑DSS
Required Qualifications
  • 1–3 years in a SOC, MSSP, or threat analyst role
  • Strong understanding of TCP/IP, DNS, HTTP/S, and log analysis
  • Familiarity with MITRE ATT&CK, threat intelligence platforms, and TTP correlation
  • Hands‑on experience with at least one SIEM, one EDR/XDR platform, and identity protection tools
  • Solid knowledge of Microsoft 365 workloads, including Defender for Office, Teams, One Drive, and Share Point
Preferred Certifications
  • CompTIA Security+ or CySA+
  • Microsoft SC-200:
    Security Operations Analyst
  • GIAC Certified Detection Analyst (GCDA)
  • EC-Council CSA / CEH
  • Kaseya One certifications
  • Sentinel One or Crowd Strike analyst certifications
What Sets This Role Apart at vi Logics
  • Work inside a Tier-3 SOC 2 Certified Data Center
  • Help clients qualify for $1.5M+ in bundled cybersecurity insurance
  • Operate in a Zero Trust Architecture (ZTA) environment with integrated SASE, SD‑WAN, and PAM
  • Be part of a team that blends ITIL‑based service delivery with cyber‑warfare‑level response protocols
Career Trajectory
  • Tier 2 / Tier 3 SOC Analyst
  • Cyber Threat Hunter
  • vCISO or Compliance Officer
  • DFIR Specialist or Security Engineer
  • TSO 365 Platform Architect
Work Environment
  • Fully remote with optional travel to client locations or vi Logics Data Centers
  • Rotational 24/7 coverage schedule with premium for overnight/weekend shifts
  • Collaborative, fast‑paced security operations team focused on measurable impact and client security maturity
#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary