Back to Remote jobs  >   All others
Security Operations Center (SOC) Analyst @Arista Networks
All others
Salary unspecified
Remote Location
Job Type full-time
Posted 2wks ago

[Hiring] Security Operations Center (SOC) Analyst @Arista Networks

2wks ago - Arista Networks is hiring a remote Security Operations Center (SOC) Analyst. 💸 Salary: unspecified 📍Location: Worldwide

Role Description

We are seeking a highly motivated and proactive Security Operations Center (SOC) Analyst to join our dynamic, remote cybersecurity team. The ideal candidate is a critical thinker, self-starter, and driven professional with hands-on experience using Crowdstrike or other EDRs. You will play a critical role in monitoring, triaging, and responding to cyber threats across our primarily Mac and Linux environments, with some Windows systems. You will work closely with a collaborative team of fellow SOC analysts, incident responders, threat hunters, and cross-functional partners across IT, engineering, and DevOps to ensure our security posture remains strong. We’re looking for someone who takes ownership, excels in high-pressure settings, and is skilled in writing CrowdStrike Query Language (CQL) (or similar) to create effective detections that protect our organization’s assets.

What You’ll Do

  • Monitor and triage security alerts.
  • Build, test, and refine detections to enhance threat identification across Mac, Linux, and Windows systems.
  • Conduct in-depth analysis of security incidents, including malware, phishing, and advanced persistent threats, leveraging SIEM and EDR capabilities.
  • Perform proactive threat hunting using the SIEM and EDR features.
  • Investigate and respond to incidents swiftly, following established incident response protocols.
  • Document findings clearly and provide actionable remediation recommendations.
  • Collaborate with cross-functional teams to strengthen security controls and mitigate vulnerabilities.
  • Stay current on emerging threats, vulnerabilities, and industry trends through self-directed learning.
  • Participate in on-call rotation for 24x7x365 SOC coverage, demonstrating reliability and accountability.
  • Escalate confirmed or suspicious incidents and cases to the Incident Response team.

Qualifications

  • 4-5+ years in a SOC and or active participant on incident response teams.
  • Hands-on experience with CrowdStrike (or other EDR), triaging security incidents.
  • Proven ability to write CQL (or similar) queries and build detections for threat monitoring.
  • Experience triaging alerts in a high-volume environment.
  • Experience with threat intelligence feeds, platform and OSINT tools (VirusTotal, etc.).
  • Familiarity with forensic analysis and evidence handling.
  • Exceptional critical thinking and analytical skills to address complex security challenges.
  • Self-starter with a proven ability to take initiative and deliver results independently.
  • Driven mindset, thriving in fast-paced, high-pressure remote work environments.
  • Strong understanding of cybersecurity principles, threat landscapes, and attack vectors.
  • Proficiency in analyzing logs, network traffic, and endpoint data using CrowdStrike Next-Gen SIEM, particularly for Mac and Linux systems (Windows experience a plus).
  • Solid knowledge of incident response processes and methodologies.
  • Familiarity with operating systems, with primary expertise in Mac and Linux, and secondary knowledge of Windows.
  • High attention to detail and ability to make sound decisions under pressure.
  • Demonstrated commitment to continuous learning and professional development in cybersecurity.

Nice-to-Have

  • Write and optimize detections to detect and investigate security events.
  • Proficiency in scripting (e.g., Python) for automating SOC workflows.
  • Experience creating playbooks in Crowdstrike Fusion SOAR (or similar SOAR).
  • Knowledge of cloud security (GCP, AWS, and or Azure).
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent experience).

Additional Information

Arista stands out as an engineering-centric company. Our leadership, including founders and engineering managers, are all engineers who understand sound software engineering principles and the importance of doing things right.

We hire globally into our diverse team. At Arista, engineers have complete ownership of their projects. Our management structure is flat and streamlined, and software engineering is led by those who understand it best. We prioritize the development and utilization of test automation tools.

Our engineers have access to every part of the company, providing opportunities to work across various domains. Arista is headquartered in Santa Clara, California, with development offices in Australia, Canada, India, Ireland, and the US. We consider all our R&D centers equal in stature.

Join us to shape the future of networking and be part of a culture that values invention, quality, respect, and fun.

Before You Apply
worldwide Be aware of the location restriction for this remote position: Worldwide
Beware of scams! When applying for jobs, you should NEVER have to pay anything. Learn more.
Back to Remote jobs  >   All others
Security Operations Center (SOC) Analyst @Arista Networks
All others
Salary unspecified
Remote Location
Job Type full-time
Posted 2wks ago
Apply for this position
Did not apply
Applied
Sent Follow-Up
Interview Scheduled
Interview Completed
Offer Accepted
Offer Declined
Unlock 152,720 Remote Jobs
worldwide Be aware of the location restriction for this remote position: Worldwide
Beware of scams! When applying for jobs, you should NEVER have to pay anything. Learn more.
Apply for this position
Did not apply
Applied
Sent Follow-Up
Interview Scheduled
Interview Completed
Offer Accepted
Offer Declined
Unlock 152,720 Remote Jobs
×

Apply to the best remote jobs
before everyone else

Access 152,720+ vetted remote jobs and get daily alerts.

4.9 ★★★★★ from 500+ reviews
Unlock All Jobs Now

Maybe later