"Alerted.org

Job Title, Industry, Employer
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Advanced Search

Advanced Search

Cancel
Remove
+ Add search criteria
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Related to

  • SOC Analyst - Tier 2

    Keeper Security, Inc. (El Dorado Hills, CA)



    Apply Now

    Keeper is hiring a talented SOC Analyst / Watch Officer (Tier 2) to join our Security Operations team. This role offers a hybrid work schedule, working 4 days per week at our El Dorado Hills, California office and one weekend day from home.

     

    Keeper’s cybersecurity software is trusted by millions of people and thousands of organizations, globally. Keeper is published in 23 languages and is sold in over 150 countries. Join one of the fastest-growing cybersecurity companies and strengthen our 24/7 security operations.

     

    About Keeper

     

    Keeper Security is transforming cybersecurity for organizations globally with zero-trust privileged access management built with end-to-end encryption. Keeper’s cybersecurity solutions are FedRAMP and StateRAMP Authorized, SOC 2 compliant, FIPS 140-2 validated, as well as ISO 27001, 27017 and 27018 certified. Keeper deploys in minutes, not months, and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations, Keeper is the leader for password, passkey and secrets management, privileged access, secure remote access and encrypted messaging. Learn how our zero-trust and zero-knowledge solutions defend against cyber threats at KeeperSecurity.com.

     

    About the Job

     

    The Tier 2 SOC Analyst / Watch Officer serves as the escalation point for Tier 1 alerts and incidents, leading tactical investigation, containment, and remediation efforts. You will act as the on-shift lead, providing technical guidance, situational awareness, and operational direction during live security events. This role requires deep technical knowledge, investigative instinct and the ability to make real-time decisions under pressure. You will work closely with engineering, DevOps and incident response teams to ensure Keeper’s environments remain secure, resilient and compliant.

    Shift: Sunday - Thursday OR Tuesday - Saturday, 7a - 4p PST

    **Training for this role will be Monday - Friday (in office) for approximately 6-8 weeks and will then transition to the regular shift

    Responsibilities

    + Lead end-to-end execution of complex DevOps and infrastructure programs, including perform in-depth triage and analysis of escalated alerts to determine scope, impact and root cause

    + Lead response actions such as isolating hosts, revoking credentials or blocking network indicators

    + Examine endpoint, network and cloud logs to reconstruct attack timelines and adversary behaviors

    + Execute and enhance incident response playbooks, detection rules and escalation criteria

    + Maintain operational command during assigned shifts, ensuring situational awareness, incident logging and proper shift handovers

    + Conduct proactive threat hunting for suspicious activity and emerging indicators of compromise

    + Validate data integrity from security tools (SIEM, EDR, IDS, etc.) and assist with tuning or integrations

    + Partner with IT, DevSecOps and compliance teams to mitigate vulnerabilities and improve defenses

    + Produce high-quality incident reports, lessons learned and recommendations for leadership

    Requirements

    + Bachelor’s degree in Cybersecurity, Computer Science or related field, or equivalent practical experience

    + 2-4 years in a SOC, incident response or cyber defense role

    + Experience with SIEM platforms (e.g., Splunk, Sumo Logic, Sentinel) and EDR technologies

    + Strong understanding of MITRE ATT&CK, threat actor TTPs and multi-source log correlation

    + Hands-on experience analyzing network traffic, endpoint behavior and cloud telemetry

    + Familiarity with scripting for automation and analysis (Python, PowerShell or Bash)

    + Strong written and verbal communication skills for incident reporting and coordination

    Preferred Qualifications

    + Certifications such as GCIA, GCIH, CySA+, CEH or equivalent

    + Experience with SOAR platforms, automation pipelines and threat intelligence enrichment

    + Familiarity with AWS Security Hub, GuardDuty or other cloud-native security services

    + Background in root cause analysis, purple-team exercises or tabletop simulations

    + Experience supporting regulated environments (SOC 2, FedRAMP, ISO 27001, etc.)

     

    Benefits

     

    + Medical, Dental & Vision (inclusive of domestic partnerships)

    + Employer Paid Life Insurance & Employee/Spouse/Child Supplemental life

    + Voluntary Short/Long Term Disability Insurance

    + 401K (Roth/Traditional)

    + A generous PTO plan that celebrates your commitment and seniority (including paid Bereavement/Jury Duty, etc)

    + Above market annual bonuses

     

    Keeper Security, Inc. is an equal opportunity employer and participant in the U.S. Federal E-Verify program. We celebrate diversity and are committed to creating an inclusive environment for all employees.

     

    Classification: Exempt

     


    Apply Now



Recent Searches

  • Senior Java Software Engineer (Kentucky)
[X] Clear History

Recent Jobs

[X] Clear History

Account Login

Cancel
 
Forgot your password?

Not a member? Sign up

Sign Up

Cancel
 

Already have an account? Log in
Forgot your password?

Forgot your password?

Cancel
 
Enter the email associated with your account.

Already have an account? Sign in
Not a member? Sign up

© 2025 Alerted.org