Opportunity sourced from the Official SkillBridge website. Not endorsed by the Department of Defense.
๐ง๐ถ๐ฒ๐ฟ 1 ๐ฆ๐ข๐ ๐ฆ๐ฝ๐ฒ๐ฐ๐ถ๐ฎ๐น๐ถ๐๐๐Location: Training fully onsite(2-3 months), opportunity is Remote (Must reside in the Seattle, WA area)๐ท๐๐ ๐น๐๐๐ ๐๐๐๐๐๐๐๐๐๐๐๐: ๐๐๐๐๐ ๐๐๐๐๐๐๐๐๐๐ ๐๐๐๐๐๐๐๐๐๐ ๐๐ ๐บ๐๐๐๐๐ฉ๐๐๐ ๐๐ ๐๐ ๐๐ $40/๐๐About the RoleWe are building a new Security Operations Center (SOC) team consisting of 6โ7 Tier 1 SOC Specialists. These specialists will serve as the first line of defenseโmonitoring alerts, triaging incidents, and escalating threats in real time. Candidates must be located in the Seattle metro area, but the role is remote.
What Youโll Doโข Monitor security alerts and events across SIEM, EDR, and logging platformsโข Perform initial triage and classification of security incidentsโข Escalate high severity or suspicious activity to Tier 2 analystsโข Analyze logs from Windows, Linux, networking devices, and cloud systemsโข Investigate common security threats such as phishing, malware, brute force attempts, and unauthorized accessโข Document findings, create incident summaries, and support SOC runbook improvementsโข Participate in shift based operations including nights and weekends Required Skills & Must HavesSOC Experienceโข Prior Tier 1 SOC, incident response, or security monitoring experience Networking Basicsโข Understanding of:o TCP/IPo DNSo HTTP/HTTPSo IP addressingo Ports and traffic flow fundamentals Operating Systems Knowledgeโข Windows: familiarity with Event IDs (e.g., 4624/4625, logon/logoff events)โข Linux: reading auth logs, systemd journal, process monitoring Security Conceptsโข Understanding of:o Common threat types (phishing, malware, brute force attacks)o Authentication and authorization basicso General security best practices Tool ProficiencyHands on experience with:โข SIEM: Splunk, Microsoft Sentinelโข EDR: Microsoft Defender for Endpoint, SentinelOneโข Logging, alerting, and monitoring tools Scripting & Automationโข Basic PowerShell or Python for log parsing, automation, and alert enrichment Educationโข Degree is acceptable but not required if experience is strong. Nice to Haves (Not Required)โข Security+ or similar foundational security certificationsโข Experience in 24/7 SOC environmentsโข Hands on with cloud security tooling (Azure, AWS, GCP)โข Familiarity with SOAR or simple automation workflows Work Environment & Expectationsโข Remote, but must reside in the Seattle area for rare onsite needsโข Ability to work overnight shifts and weekendsโข Team-oriented, strong communication skills, reliable escalation disciplineโข Adherence to SOC runbooks, incident handling procedures, and service-level expectations
Schedule:โข Training Phase (First 2โ3 Months): MondayโFriday, 8:30 AM โ 5:00 PMโข Post Training: Night shifts + weekend rotationso Must be able to work overnightso Must be able to work weekendso Shift structure: 5ร8 hours or 4ร10 hours (TBD)
US Air Force, US Army, US Coast Guard, US Marine Corps, US Navy, US Space Force
Location: Training fully onsite(2-3 months), opportunity is Remote (Must reside in the Seattle, WA area)
Send a professional application in seconds, created by prior SkillBridge POCs.