Information Security Analyst - I
The Judge Group
IT
Remote
Posted on May 17, 2026
Job Title: Information Security Analyst I (SOC – Tier 1)
Location: Remote (Home-Based)
About the Role
We are seeking an Information Security Analyst to join a 24/7 Security Operations Center (SOC). In this role, you will serve as the first line of defense by monitoring security events, identifying potential threats, and escalating incidents to protect enterprise environments. You’ll work across modern SIEM and cybersecurity tools while collaborating with cross-functional teams to ensure timely detection and response.
What You’ll Do
- Monitor security alerts and events in near real-time across a 24/7 SOC environment.
- Identify Indicators of Compromise (IOCs) using SIEM platforms and security tools.
- Perform initial triage and analysis of alerts, prioritizing incidents based on severity and risk.
- Escalate critical issues in accordance with defined service level agreements (SLAs).
- Investigate and respond to customer requests, including querying logs and providing actionable insights.
- Support incident response activities using SIEM and cybersecurity toolkits.
- Collaborate with Tier II/III teams to address complex or escalated incidents.
- Maintain accurate documentation, including incident reports and escalation tickets.
- Contribute to SOC knowledge base improvements and operational best practices.
Minimum Qualifications
- Associate degree in Computer Science, Information Security, or a related field.
- 1–3 years of experience in cybersecurity, technical support, or a related role (e.g., help desk).
- Basic understanding of cybersecurity principles, threat landscape, and indicators of compromise.
- Strong analytical and problem-solving skills.
- Effective written and verbal communication skills in English.
- Ability to engage professionally with customers and internal stakeholders.
Preferred Qualifications
- Bachelor’s degree in Computer Science, Information Security, or a related field.
- Experience working in a Security Operations Center (SOC) environment.
- Familiarity with threat hunting and incident response methodologies.
- Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Microsoft Sentinel).
- Knowledge of network security, logging, and troubleshooting techniques.
- Experience analyzing IDS/IPS alerts and performing basic forensic analysis.
- Scripting experience (e.g., Python, PowerShell, Bash).
By providing your phone number, you consent to: (1) receive automated text messages and calls from the Judge Group, Inc. and its affiliates (collectively “Judge”) to such phone number regarding job opportunities, your job application, and for other related purposes. Message & data rates apply and message frequency may vary. Consistent with Judge's Privacy Policy, information obtained from your consent will not be shared with third parties for marketing/promotional purposes. Reply STOP to opt out of receiving telephone calls and text messages from Judge and HELP for help.