Jr. SOC QA Analyst
Location: Remote
Job Type: W2 Contract
Schedule: M-F, 8am-4:45pm CST
Pay Rate: $40 – 45/hourly with optional benefits packages
Summary:
This specialized Level 2 role plays a critical part in the Quality Assurance (QA) function within the Security Operations Center (SOC). Rather than focusing on active incident response, this position is dedicated to driving excellence in SOC performance through engagement with KPIs, metrics, and reporting. The role supports continuous improvement across all SOC shifts, enabling more robust coaching, sharper insights, and stronger operational alignment. As a key member of the global IT security team, this individual will collaborate closely with US-based SOC teams to elevate quality standards and ensure consistent, high-impact reporting.
Responsibilities:
Assisting in QA duties across all SOC shifts to ensure timely reporting and tracking of all SOC issues for management review. This additional support in QA will ensure greater capacity in review and scope of coaching efforts.
- Part of the global IT security team working closely with the US SOCs teams.
- Performs a combination of duties in accordance with departmental guidelines.
- Queue admin (execution, oversight, and delegation).
- Case review and quality assurance.
- Metrics review and reporting.
- Assist in case work as needed.
- Management updates on daily issues and impact.
- Maintain scheduled weekly/bi-monthly/monthly QA meetings with L2 and L3 analysts.
- Coordinate Roundtable topics/training and lunch & learn sessions.
- Conduct analysis review of junior staff for quality control; mentor junior staff to encourage career growth and development.
- Collaborate with SOC, Intelligence, Incident Response and Enterprise Security Teams for incident investigations and hunt missions when possible.
- Identify visibility gaps in the network and recommend solutions.
- Develop, maintain and update playbooks, process, and detection capabilities based on real-time feedback from investigations.
- Articulate security incident details to business stakeholders and non-technical individuals.
- May perform additional duties as assigned
Education and Experience Requirements:
- Minimum of three years of technical experience in the security aspects of multiple platforms, operating systems, software, communications and network protocols or an equivalent combination.
- Bachelor’s degree in Computer Science or equivalent.
- Industry certifications preferred (CISSP, GCFA, GCIH, GCFE, or equivalent).
- ITIL certification is a plus in this role.
Technical Skills Requirements:
- Familiarity with SOC operations, scheduling, and tools including SIEM, SOAR, and DFIR products.
- Knowledge of the incident response lifecycle and cyber security leading practices.
- SLA calculations and KPI tracking experience.
- Solid understanding of security policy construction and publication.
- In-depth knowledge of regulations (i.e., SOX, privacy, etc.) and internal controls as they apply to IT.
- Ability to influence change in corporate understanding and adoption of information security concepts.
- Experience in technical writing and knowledgebase management and administration.
- Proven solid analytical and problem-solving skills.
- Excellent communications and interpersonal skills and the ability to work effectively with peers, IT management and staff, and internal/external business partners/clients.
- Experience in coaching and reporting findings to assist in team growth.
- Ability to manage various technical projects to completion with limited oversight.
- Advanced computer skills including Microsoft Office suite and other business-related software systems (MS Excel or similar spreadsheet and database applications experience is a must).
- Other technologies will apply dependent on business area supported.
- Preferred insurance industry knowledge.