Back to Remote jobs  >   All others
Security Operations Center Analyst @IonQ
All others
Salary $83,430 - $109,..
Remote Location
πŸ‡ΊπŸ‡Έ USA Only
Job Type full-time
Posted 2wks ago

[Hiring] Security Operations Center Analyst @IonQ

2wks ago - IonQ is hiring a remote Security Operations Center Analyst. πŸ’Έ Salary: $83,430 - $109,232 πŸ“Location: USA

Role Description

As the leader in quantum technology and quantum infrastructure, we're expanding our security operations capability and looking for an SOC Analyst who is excited to help build and mature our detection and response function. You'll work in an environment that values collaboration, inclusivity, and great ideas β€” no matter where they come from. We promote teamwork, openness, and a culture where people are encouraged to share improvements and challenge the status quo in a constructive way.

In this role, you'll handle the full lifecycle of monitoring, analyzing, and responding to security events across our environment. You'll combine quick, effective triage with deeper investigations, threat hunting, and hands-on remediation. You'll also have opportunities to influence tooling, detections, processes, and personal development as our team grows.

Responsibilities:

  • Monitor SIEM, EDR, IDS/IPS, cloud security, and email security alerts for potential threats or abnormal activity.
  • Triage, validate, and investigate security alerts; identify false positives; escalate or resolve incidents as appropriate.
  • Perform in-depth analysis of suspicious activity and correlate logs across multiple systems to determine root cause, scope, and impact.
  • Execute containment and remediation actions such as host isolation, account lockdown, IOC blocking, vulnerability mitigation, and post-recovery validation.
  • Conduct proactive threat hunting based on threat intelligence, behavioral patterns, or hypothesis-driven analysis.
  • Support forensic data collection and examination (endpoint artifacts, system logs, cloud audit logs, etc.).
  • Analyze suspicious files, scripts, URLs, and domains using sandboxing, tooling, and threat intelligence sources.
  • Recommend and contribute to improvements in SIEM rules, detections, automation workflows, and security playbooks.
  • Participate in incident response activities, including documentation, communication with stakeholders, and post-incident reviews.
  • Monitor and maintain the health and accuracy of security tooling, connectors, and log ingestion pipelines.
  • Help improve security processes, policies, and standards as part of a growing team.
  • Maintain clear, organized case notes and produce reports when needed.
  • Opportunity to help shape a growing SOC and influence detection engineering, automation, and incident response processes.

Qualifications

  • 1–3+ years of experience in a SOC, incident response, or security operations environment.
  • Hands-on experience with SIEM, EDR, and cloud security tools (e.g., Microsoft Sentinel, Defender XDR, Splunk, CrowdStrike, etc.).
  • Strong understanding of Windows, Linux, and/or macOS internals; identity security; authentication flows; and network fundamentals (TCP/IP, DNS, HTTP).
  • Familiarity with threat landscape, threat intelligence workflows, and MITRE ATT&CK.
  • Ability to write basic queries or scripts (KQL, SPL, PowerShell, Python, etc.).
  • Analytical thinker with strong troubleshooting skills and a structured approach to incident handling.
  • Clear communication skills and the ability to document technical findings concisely and accurately.
  • A commitment to doing work the right way β€” following sound processes, documenting thoroughly, and maintaining a high standard for quality and security operations.
  • A genuine desire to learn, grow, and continuously improve as the environment, tools, and challenges evolve.

Preferred Qualifications

  • Experience with the Microsoft security stack (Sentinel, Defender for Endpoint/XDR, Entra ID Protection).
  • Experience with threat hunting, detection tuning, or security automation.
  • Certifications such as Security+, CySA+, SC-200, AZ-500, GCIH/GCED/GCIA, or equivalent.
  • Experience working in fast-paced, high-growth tech environments.

Benefits

  • Comprehensive medical, dental, and vision plans.
  • Matching 401K.
  • Unlimited PTO and paid holidays.
  • Parental/adoption leave.
  • Legal insurance.
  • Home technology stipend.

Location

Ideally, this role will work onsite at our office located in Bothell, WA or College Park, MD. We are open to hybrid and remote options for the right candidate.

Travel

Minimal, less than 10%

Compensation

The approximate base salary range for this position is $83,430 - $109,232. The total compensation package includes base, bonus, and equity. Compensation will vary based on individual factors such as education, qualifications, and experience of the final candidate(s), specific office location, and calibration against relevant market data and internal team equity.

Before You Apply
️
πŸ‡ΊπŸ‡Έ Be aware of the location restriction for this remote position: USA Only
β€Ό Beware of scams! When applying for jobs, you should NEVER have to pay anything. Learn more.
Back to Remote jobs  >   All others
Security Operations Center Analyst @IonQ
All others
Salary $83,430 - $109,..
Remote Location
πŸ‡ΊπŸ‡Έ USA Only
Job Type full-time
Posted 2wks ago
Apply for this position
Did not apply βœ“
Applied βœ“
Sent Follow-Up βœ“
Interview Scheduled βœ“
Interview Completed βœ“
Offer Accepted βœ“
Offer Declined βœ“
Unlock 152,720 Remote Jobs
️
πŸ‡ΊπŸ‡Έ Be aware of the location restriction for this remote position: USA Only
β€Ό Beware of scams! When applying for jobs, you should NEVER have to pay anything. Learn more.
Apply for this position
Did not apply βœ“
Applied βœ“
Sent Follow-Up βœ“
Interview Scheduled βœ“
Interview Completed βœ“
Offer Accepted βœ“
Offer Declined βœ“
Unlock 152,720 Remote Jobs
Γ—

Apply to the best remote jobs
before everyone else

Access 152,720+ vetted remote jobs and get daily alerts.

4.9 β˜…β˜…β˜…β˜…β˜… from 500+ reviews
Unlock All Jobs Now

Maybe later