The SOC Analyst I position at Optiv is a fully remote role that requires shift flexibility, including the ability to rotate between days, mids, and nights. This position is part of a team that provides 24/7 support, ensuring that security incidents are monitored and addressed promptly. The Threat Analyst will be responsible for intrusion and incident monitoring and detection, utilizing customer-provided data sources and various audit and monitoring tools at both government and enterprise levels. The role involves close collaboration with Technology Analysts and Architects to effectively service customers and address their security needs. In this role, the SOC Analyst will document and report on potential security incidents identified in customer environments, providing a detailed timeline of events. The analyst will work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets. Acting as a coordinator for security events that require urgent response, containment, and remediation is a critical aspect of this position. The analyst will also provide analysis on various security enforcement technologies, including SIEM, anti-virus, content filtering, malware prevention, firewalls, and intrusion detection systems. The SOC Analyst I will perform knowledge transfers, document, and train clients on the mitigation of identified threats, while also providing ongoing recommendations to peers and customers on tuning and best practices. Active research on current threats and attack vectors being exploited in the wild is expected, along with collaboration with other analysts to investigate escalations. This role is essential in maintaining the security posture of clients and ensuring that they are well-informed about potential threats and vulnerabilities.