Kaseya Limited
Managed SOC Analyst Tier 1
Kaseya Limited, Miami, Florida, us, 33222
Kaseya is the leading provider of complete IT infrastructure and security management solutions for Managed Service Providers (MSPs) and internal IT organizations worldwide powered by AI. Kaseya's best-in-breed technologies allow organizations to efficiently manage and secure IT to drive sustained business success. Kaseya has achieved sustained, strong double-digit growth over the past several years and is backed by Insight Venture Partners, a leading global private equity firm investing in high-growth technology and software companies that drive transformative change in the industries they serve.
Founded in 2000, Kaseya currently serves customers in over 20 countries across a wide variety of industries and manages over 15 million endpoints worldwide. To learn more about our company and our award-winning solutions, go to and for more information on Kaseya's culture, please click here: Kaseya Culture.
Kaseya is not your typical company. We are not afraid to tell you exactly who we are and our expectations. We have achieved record levels of success being BOLD, being GRITTY, being ACCOUNTABLE. The thousands of people that succeed at Kaseya are prepared to go above and beyond for the betterment of our customers, and the betterment of their careers and long-term financial wealth.
WHAT WE ARE LOOKING FOR:
We are seeking a highly motivated
SOC Analyst I
to join our Security Operations Center (SOC) team. The ideal candidate will have foundational knowledge in cybersecurity, strong analytical skills, and the ability to work effectively in a 24x7 operational environment. If you are passionate about safeguarding systems and responding to security threats, this role is a perfect opportunity to grow your career in cybersecurity. WHAT YOU'LL DO:
As a
SOC Analyst I , you will play a critical role in monitoring, analyzing, and triaging security events while escalating complex incidents to Tier II Analysts. You will focus on maintaining the security of critical systems, responding to incidents, and performing technical tasks to support our cybersecurity efforts. ESSENTIAL DUTIES AND RESPONSIBILITIES:
System Monitoring:
Continuously monitor, analyze, and triage systems and events across Windows, macOS, and Linux environments in a 24x7 operations setting. Threat Identification:
Detect suspicious or malicious activities across Windows environments, Microsoft 365 & Entra, and firewalls. Incident Response:
Perform incident detection, response, and remediation activities to address security threats. SOC Ticket Management:
Address and resolve Managed SOC tickets with diligence and efficiency. Incident Analysis:
Conduct in-depth analysis by correlating data from various sources to assess the impact on critical systems. Independent Tasks:
Perform technical tasks and problem-solving without direct supervision. WHAT YOU'LL BRING:
Requirements:
Education:
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, Management and Information Systems, or related fields. Certifications:
Security+ (minimum requirement). Additional certifications such as SSCP or CEH are a plus. Technical Skills:
Familiarity with static and dynamic malware analysis techniques, 0-day vulnerabilities, phishing attacks, and ransomware attack groups. Understanding of frameworks like MITRE ATT&CK and NIST. Knowledge of networking fundamentals, including IP subnetting, private vs. public IPs, and LAN components. Experience with various firewalls, syslog, JSON, and other network log formats. Proficiency with tools and scripting languages such as PowerShell, Python, and CMD. Soft Skills:
Strong written and verbal communication skills. Ability to work in a high-pressure, fast-paced 24x7 environment, including nights and weekends. Other Requirements:
Must be authorized to work within the US and successfully pass a background check. WHY JOIN US:
Professional Development:
Expand your knowledge and skills in cybersecurity through hands-on experience and training. Dynamic Environment:
Work in a collaborative, fast-paced team focused on protecting critical systems and data. Competitive Benefits:
Enjoy a comprehensive compensation package, including health coverage, paid time off, and opportunities for career growth. Join the Kaseya growth rocket ship and see how we are! Additional information Kaseya provides equal employment opportunity to all employees and applicants without regard to race, religion, age, ancestry, gender, sex, sexual orientation, national origin, citizenship status, physical or mental disability, veteran status, marital status, or any other characteristic protected by applicable law.
#J-18808-Ljbffr
We are seeking a highly motivated
SOC Analyst I
to join our Security Operations Center (SOC) team. The ideal candidate will have foundational knowledge in cybersecurity, strong analytical skills, and the ability to work effectively in a 24x7 operational environment. If you are passionate about safeguarding systems and responding to security threats, this role is a perfect opportunity to grow your career in cybersecurity. WHAT YOU'LL DO:
As a
SOC Analyst I , you will play a critical role in monitoring, analyzing, and triaging security events while escalating complex incidents to Tier II Analysts. You will focus on maintaining the security of critical systems, responding to incidents, and performing technical tasks to support our cybersecurity efforts. ESSENTIAL DUTIES AND RESPONSIBILITIES:
System Monitoring:
Continuously monitor, analyze, and triage systems and events across Windows, macOS, and Linux environments in a 24x7 operations setting. Threat Identification:
Detect suspicious or malicious activities across Windows environments, Microsoft 365 & Entra, and firewalls. Incident Response:
Perform incident detection, response, and remediation activities to address security threats. SOC Ticket Management:
Address and resolve Managed SOC tickets with diligence and efficiency. Incident Analysis:
Conduct in-depth analysis by correlating data from various sources to assess the impact on critical systems. Independent Tasks:
Perform technical tasks and problem-solving without direct supervision. WHAT YOU'LL BRING:
Requirements:
Education:
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, Management and Information Systems, or related fields. Certifications:
Security+ (minimum requirement). Additional certifications such as SSCP or CEH are a plus. Technical Skills:
Familiarity with static and dynamic malware analysis techniques, 0-day vulnerabilities, phishing attacks, and ransomware attack groups. Understanding of frameworks like MITRE ATT&CK and NIST. Knowledge of networking fundamentals, including IP subnetting, private vs. public IPs, and LAN components. Experience with various firewalls, syslog, JSON, and other network log formats. Proficiency with tools and scripting languages such as PowerShell, Python, and CMD. Soft Skills:
Strong written and verbal communication skills. Ability to work in a high-pressure, fast-paced 24x7 environment, including nights and weekends. Other Requirements:
Must be authorized to work within the US and successfully pass a background check. WHY JOIN US:
Professional Development:
Expand your knowledge and skills in cybersecurity through hands-on experience and training. Dynamic Environment:
Work in a collaborative, fast-paced team focused on protecting critical systems and data. Competitive Benefits:
Enjoy a comprehensive compensation package, including health coverage, paid time off, and opportunities for career growth. Join the Kaseya growth rocket ship and see how we are! Additional information Kaseya provides equal employment opportunity to all employees and applicants without regard to race, religion, age, ancestry, gender, sex, sexual orientation, national origin, citizenship status, physical or mental disability, veteran status, marital status, or any other characteristic protected by applicable law.
#J-18808-Ljbffr