referry - Job Search Platform Logoreferry
Näytä kaikki mahdollisuudet

SOC Investigation Specialist

1 päivää sitten|Etänä|$70-$95/tunti|Tuntisopimus|3+ vuoden kokemus|Corma Labs
SplunkCrowdstrike FalconMicrosoft Defender For EndpointSentineloneAWS CloudtrailGuarddutyAzure Activity LogDefender For CloudGCP Cloud Audit LogsOkta Identity CloudMicrosoft Entra IdProofpointMimecastPythonSpl (splunk Processing Language)Log AnalysisEntity PivotingTimeline ReconstructionEvidence CorrelationAlert TriageIncident InvestigationSoc AutomationSecurity Certifications

💡 Vinkki hakemiseen: Napsauttamalla "Hae ilmaiseksi Mercor-sivustolla" sinut ohjataan Mercor-sivuston viralliselle sivulle. Tämä on sinulle 100 % ilmaista ja auttaa tukemaan alustaamme kumppanuuspalkkioiden kautta.
⚠️ Käännöshuomautus: Tämän työpaikan tiedot on käännetty tekoälyllä. Jos jokin on epäselvää tai epätarkkaa, katso englanninkielinen alkuperäisteksti.

Role Overview

Mercor is hiring SOC Investigation Specialist on behalf of high-growth technology and enterprise partners building next-generation SOC automation and AI-driven investigation systems. This role is ideal for experienced SOC analysts who can apply real-world investigative judgment to review, validate, and construct high-quality security investigations across SIEM, endpoint, cloud, and identity environments.

Responsibilities

  • Review, monitor, and evaluate SOC alerts and investigation outputs based on predefined scenarios and criteria.
  • Distinguish true positives from false positives by validating investigative evidence and alert context.
  • Perform end-to-end security investigations when required, including log analysis, entity pivoting, timeline reconstruction, and evidence correlation.
  • Assess the correctness, completeness, and quality of SOC investigations produced by automated or human workflows.
  • Apply consistent investigative judgment while recognizing that multiple valid investigation paths may exist for the same alert.
  • Make clear binary determinations (e.g., ACCEPT / PASS) while also producing detailed ground-truth investigations when required.
  • Use Splunk extensively to pivot across logs, entities, and timelines, including reading and reasoning about SPL queries.
  • Maintain clear and accurate documentation of investigative steps, assumptions, evidence, and conclusions.
  • Collaborate with program leads and other expert annotators to uphold high-quality investigation and annotation standards.
  • Mentor or support other analysts where applicable, particularly in long-term or lead annotator roles.

Requirements

  • 3+ years of hands-on experience as a SOC analyst in a production SOC environment (Tier 2 or above strongly preferred).
  • Strong understanding of alert triage, incident investigation workflows, and evidence-based decision-making under time constraints.
  • Mandatory hands-on experience with Splunk, including: , ,[object Object],
  • Proven ability to evaluate SOC investigations and determine whether conclusions are valid, incomplete, or incorrect.
  • Strong investigative judgment and comfort making decisive evaluations.
  • Fluent English (written and spoken) with strong documentation and communication skills.

Nice to Have

  • Experience with Endpoint Detection & Response (EDR) tools such as CrowdStrike Falcon, Microsoft Defender for Endpoint, or SentinelOne.
  • Experience analyzing cloud security logs and signals: , ,[object Object],
  • Familiarity with Identity & Access Management platforms such as Okta Identity Cloud or Microsoft Entra ID (Azure AD).
  • Experience with email security tools like Proofpoint or Mimecast.
  • SOC leadership or mentoring experience.
  • Basic scripting experience (Python or similar).
  • Security certifications (optional): GCIA, GCIH, GCED, Splunk certifications, Security+, CCNA, or cloud security certifications.

Why Join

  • Work on cutting-edge SOC automation and AI-driven investigation systems.
  • Apply real-world SOC expertise to shape how future security teams investigate and respond to threats.
  • Take ownership of high-impact investigative evaluations and ground-truth security cases.
  • Collaborate with experienced SOC practitioners, security engineers, and AI teams.
  • Join Mercor’s global network of vetted security professionals.

Saa personoituja työpaikkahälytyksiä

💰 278 korkeapalkkaista työpaikkaa

Ei roskapostia, koskaan
Peru tilaus milloin tahansa
Työpaikkoja huippualustoilta