ionq
Security Operations Center Analyst
At a Glance
- Location
- Bothell, Washington, United States; College Park, Maryland, United States; Remote, US
- Work Regime
- remote
- Experience
- 3+ years
- Compensation
- ry range for this position is $83,430 - $109,232. The total compensation packa
- Posted
- 2026-03-19T18:41:56-04:00
Key Requirements
Required Skills
Domain Knowledge
- Automation
Benefits & Perks
matching 401K, unlimited PTO and paid holidays, parental/a
Requirements
1–3+ years of experience in a SOC, incident response, or security operations environment.
Hands-on experience with SIEM, EDR, and cloud security tools (e.g., Microsoft Sentinel, Defender XDR, Splunk, CrowdStrike, etc.).
Strong understanding of Windows, Linux, and/or macOS internals; identity security; authentication flows; and network fundamentals (TCP/IP, DNS, HTTP).
Familiarity with threat landscape, threat intelligence workflows, and MITRE ATT&CK.
Ability to write basic queries or scripts (KQL, SPL, PowerShell, Python, etc.).
Analytical thinker with strong troubleshooting skills and a structured approach to incident handling.
Responsibilities
Monitor SIEM, EDR, IDS/IPS, cloud security, and email security alerts for potential threats or abnormal activity.
Triage, validate, and investigate security alerts; identify false positives; escalate or resolve incidents as appropriate.
Perform in-depth analysis of suspicious activity and correlate logs across multiple systems to determine root cause, scope, and impact.
Execute containment and remediation actions such as host isolation, account lockdown, IOC blocking, vulnerability mitigation, and post-recovery validation.
Conduct proactive threat hunting based on threat intelligence, behavioral patterns, or hypothesis-driven analysis.
Support forensic data collection and examination (endpoint artifacts, system logs, cloud audit logs, etc.).