Security Analyst

ConnectOS
Summary
Join a fast-paced Managed Service Provider (MSP) as a Level 1 Security Analyst. The ideal candidate possesses strong foundational cybersecurity knowledge, experience working across multiple client environments, and adaptability to a 24x7 roster. Responsibilities include monitoring and analyzing security alerts, performing initial triage and investigation of security events, documenting incidents, assisting in incident response, communicating with clients, supporting new client onboarding, ensuring compliance, and contributing to continuous monitoring. The role requires 1โ2 years of experience in a SOC or Security Analyst role (MSP experience preferred), familiarity with SIEM and EDR tools, and a basic understanding of networking concepts and common security threats. Excellent communication and analytical skills are essential. Benefits include work-from-home options, medical, dental, and life insurance, paid vacation and sick leave, a competitive salary, financial assistance, mandatory government benefits, regular company events, and career growth opportunities.
Requirements
- 1โ2 years of experience in a SOC or Security Analyst role (MSP experience preferred)
- Practical experience with SIEM platforms (e.g., Rapid7 InsightIDR, Splunk, QRadar)
- Familiarity with endpoint detection and response (EDR) tools
- Basic understanding of networking concepts, Windows/Linux operating systems, and common security threats
- Strong analytical and investigative mindset; able to manage multiple client environments
- Excellent written and verbal communication for incident documentation and client interactions
- Flexibility to work across all shifts including off-hours and public holidays
Responsibilities
- Monitor and analyze security alerts from client environments via SIEM, EDR, IDS/IPS, and other MSP security tools
- Perform initial triage and investigation of security events; escalate as needed to Level 2 analysts or other teams
- Document incidents thoroughly in MSP ticketing systems
- Assist in incident response (containment, root cause analysis, remediation coordination)
- Communicate clearly and professionally with clients regarding incident status, actions taken, and security guidance
- Support new client onboarding, including alert tuning and setup
- Ensure compliance with MSPโs security procedures, SLAs, and service delivery standards
- Contribute to continuous monitoring as part of the 24x7 SOC rotation
Preferred Qualifications
- Certifications such as CompTIA Security+, Certified SOC Analyst (CSA), or similar (advantageous)
- Exposure to cloud security monitoring (e.g., AWS GuardDuty, Azure Sentinel)
- Experience handling phishing, malware, or insider threat investigations
- Familiarity with MITRE ATT&CK framework and threat intelligence platforms
- Scripting or automation skills (e.g., Python, PowerShell) to support incident response
- ITIL knowledge or previous experience working with ticketing systems like ServiceNow, Jira, or ConnectWise
- Participation in capture-the-flag (CTF) events or security competitions
- Bachelorโs degree in Cybersecurity, Information Technology, or a related field
Benefits
- WFH
- Medical, Dental Coverage and Life insurance from day 1 of employment
- Paid Vacation and Sick Leave (with Quarterly Sick Leave Conversion)
- Competitive salary package and annual appraisal
- Financial Assistance Program
- Mandatory Government Benefits
- Regular Company Events, Work Life Balance, and Career growth opportunities
Share this job:
Similar Remote Jobs

