Job Information

Insight Global Tier 1 SOC Analyst in Miami, Florida

Job Description

As a Tier 1 SOC Analyst, your role is pivotal in safeguarding our clients' assets and information by promptly detecting, analyzing, and responding to security incidents within our Security Operations Center (SOC). You will be primarily focused on addressing security event incident response tickets, particularly those concerning lateral movements within networks or anomalous activities, such as logins from different geographic locations. The tickets you handle will predominantly fall within Priority Level 3 & 4, which are considered lower priority incidents.


  • Utilize SIEM (Security Information and Event Management) tools to monitor security alerts and events.

  • Conduct initial triage of security incidents to assess severity and potential impact.

  • Perform basic investigation and analysis of security events to identify indicators of compromise (IOCs).

  • Follow predefined procedures and protocols to respond to security incidents swiftly and effectively.

  • Escalate incidents to higher-tier SOC analysts or management as required.

  • Collaborate with cross-functional teams to ensure timely resolution of security issues.

  • Accurately and thoroughly document all incidents, investigations, and response actions.

  • Engage in continuous learning and training to remain abreast of emerging threats and security technologies.

Given the high volume of tickets received by our team, automation plays a significant role in streamlining processes. Each ticket contains comprehensive data, enabling efficient resolution, with some cases taking as little as 30 seconds to resolve. You'll have the opportunity to resolve issues across various industries, including aerospace, banking, healthcare, public education, and more.

Your dedication to maintaining a vigilant stance against cyber threats and your commitment to ongoing learning will be invaluable assets in fulfilling your responsibilities effectively. Join us in our mission to uphold the security and integrity of our clients' systems and data.

Skills and Requirements


  * Minimum 1 year of experience in a cyber security-related role

  * Experience with Endpoint Detection and Response (EDR) tools, preferably SentinelOne

  * Previous experience working in a Security Operations Center (SOC)

Familiarity with firewalls Plusses:

  * Experience utilizing SIEM (Security Information and Event Management) tools to monitor security alerts and events. - They leverage Rapid 7 Insight IDR and Stellar SIEM in their SOC

  * Experience in Cyber Threat Hunting (CTH) and Cyber Threat Intelligence (CTI)

  * Relevant certifications such as Security+, CISSP, or CEH

  * Knowledge of Identity and Access Management (IAM)

Familiarity with Active Directory null

We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal employment opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment without regard to race, color, ethnicity, religion,sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military oruniformed service member status, or any other status or characteristic protected by applicable laws, regulations, andordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request to