ionq

Security Operations Center Analyst

Apply Now

At a Glance

Location
Bothell, Washington, United States; College Park, Maryland, United States; Remote, US
Work Regime
remote
Experience
3+ years
Compensation
ry range for this position is $83,430 - $109,232. The total compensation packa
Posted
2026-03-19T18:41:56-04:00

Key Requirements

Required Skills

LinuxPython

Domain Knowledge

  • Automation

Benefits & Perks

Time Off

matching 401K, unlimited PTO and paid holidays, parental/a

Requirements

1–3+ years of experience in a SOC, incident response, or security operations environment.

Hands-on experience with SIEM, EDR, and cloud security tools (e.g., Microsoft Sentinel, Defender XDR, Splunk, CrowdStrike, etc.).

Strong understanding of Windows, Linux, and/or macOS internals; identity security; authentication flows; and network fundamentals (TCP/IP, DNS, HTTP).

Familiarity with threat landscape, threat intelligence workflows, and MITRE ATT&CK.

Ability to write basic queries or scripts (KQL, SPL, PowerShell, Python, etc.).

Analytical thinker with strong troubleshooting skills and a structured approach to incident handling.

Responsibilities

Monitor SIEM, EDR, IDS/IPS, cloud security, and email security alerts for potential threats or abnormal activity.

Triage, validate, and investigate security alerts; identify false positives; escalate or resolve incidents as appropriate.

Perform in-depth analysis of suspicious activity and correlate logs across multiple systems to determine root cause, scope, and impact.

Execute containment and remediation actions such as host isolation, account lockdown, IOC blocking, vulnerability mitigation, and post-recovery validation.

Conduct proactive threat hunting based on threat intelligence, behavioral patterns, or hypothesis-driven analysis.

Support forensic data collection and examination (endpoint artifacts, system logs, cloud audit logs, etc.).