Know ATS Score
CV/Résumé Score
  • Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: IT Security Analyst Tier 1 | 3rd Shift | IN HOUSE.
United States Jobs Expertini

Urgent! IT Security Analyst - Tier 1 | 3rd Shift | IN HOUSE Job Opening In Miami Lakes – Now Hiring Infosight, Inc.

IT Security Analyst Tier 1 | 3rd Shift | IN HOUSE



Job description

Benefits:


  • 401(k)

  • 401(k) matching

  • Competitive salary

  • Dental insurance

  • Employee discounts

  • Flexible schedule

  • Health insurance

  • Opportunity for advancement

  • Paid time off

  • Training & development

  • Vision insurance





IT SOC Analyst - Tier 1 


3rd Shift  |  IN-HOUSE 

Please note:  This is NOT a remote position


Miami Lakes, FL - Local Candidates Only 

 
We are seeking a highly skilled and driven SOC Analyst to join our cybersecurity operations team.

This is not just another monitoring role — this is an opportunity to defend critical infrastructure, regulated industries, and enterprise environments against evolving cyber threats.


As a SOC Analyst, you will be on the front lines of cyber defense, actively monitoring, analyzing, and responding to incidents across diverse client environments.

You’ll work hands-on with leading SIEM platforms such as USM, Microsoft Sentinel, and CrowdStrike, while also leveraging the power of Azure security services.





If you thrive under pressure, have a passion for hunting threats, and are eager to continuously sharpen your skills in a high-paced, growth-focused environment, we want you on our team.




Key Responsibilities 

  • Actively monitor, analyze, and respond to security events during the overnight shift, ensuring 24x7x365 coverage for our clients.

  • Investigate and resolve security incidents from detection to remediation with precision, documenting findings and escalating when necessary.

  • Collaborate with fellow SOC analysts, engineers, and stakeholders to improve detection logic, workflows, and incident response playbooks.

  • Perform deep analysis of logs, alerts, and threat data across SIEM platforms (USM, Sentinel, CrowdStrike) and Azure environments to identify malicious activity.

  • Support the deployment, tuning, and optimization of security tools and processes to enhance operational effectiveness.

  • Stay ahead of the curve by researching and applying the latest threat intelligence, attacker TTPs, and defense strategies.

Qualifications & Skills

  • Experience in a SOC or cybersecurity operations role with a strong track record in incident detection and response.

  • Hands-on expertise with at least one enterprise SIEM platform (USM, Microsoft Sentinel, CrowdStrike).

  • Familiarity with Azure security and administration, including monitoring and configuration best practices.

  • Strong understanding of threat actors, attack techniques (MITRE ATT&CK), and mitigation strategies.

  • Analytical mindset with exceptional problem-solving skills and the ability to operate independently during critical events.

  • Excellent communication skills, both written and verbal, for clear incident reporting and cross-team collaboration.



 



Required Skill Profession

Computer Occupations



Your Complete Job Search Toolkit

✨ Smart • Intelligent • Private • Secure

Start Using Our Tools

Join thousands of professionals who've advanced their careers with our platform

Rate or Report This Job
If you feel this job is inaccurate or spam kindly report to us using below form.
Please Note: This is NOT a job application form.


    Unlock Your IT Security Potential: Insight & Career Growth Guide