AI Summary / Key Details
- Role: Remote Information Security Analyst | Defend the Digital Frontier from Anywhere
- Compensation: $25 - $45 / hr
- Location: Remote
- How to apply: Click the Apply Now button on this page to submit your resume.
Recent Activity
body { font-family: Arial, sans-serif; line-height: 1.6; max-width: 800px; margin: 0 auto; padding: 20px; color: #333; }
h1 { color: #2c3e50; border-bottom: 2px solid #3498db; padding-bottom: 10px; }
h2 { color: #2980b9; margin-top: 30px; }
h3 { color: #34495e; }
ul { padding-left: 20px; }
.salary { background-color: #f8f9fa; padding: 15px; border-left: 4px solid #2ecc71; margin: 20px 0; font-weight: bold; }
Are you a vigilant problem-solver passionate about outsmarting cyber threats? We are seeking a talented Information Security Analyst to join our fully distributed security team. In this critical remote role, you will monitor, analyze, and fortify our digital assets, ensuring business continuity and data integrity for a global client base, all from the comfort of your home office.
Estimated Salary Range: $85,000 – $120,000 USD/year (commensurate with experience, certifications, and proven impact)
About the Role
As a Remote Information Security Analyst, you will be the cornerstone of our security operations. You will work within our Security Operations Center (SOC) to detect, investigate, and respond to security incidents in real-time. Your daily mission involves analyzing logs, managing alerts from our SIEM platform, and proactively hunting for threats that bypass automated defenses. This isn’t just about reacting to alerts; it’s about understanding attacker tactics, improving our detection rules, and contributing to a culture of security awareness. You will collaborate with IT, DevOps, and engineering teams to embed security into every phase of our product lifecycle.
Key Responsibilities
- 24/7 shift-based monitoring of security events using SIEM (Splunk, QRadar, or similar) and EDR tools.
- Conduct in-depth threat analysis, triage incidents, and lead initial response efforts to contain and eradicate threats.
- Perform vulnerability management: scan with tools like Nessus or Qualys, prioritize findings, and track remediation.
- Develop and refine correlation rules, dashboards, and reports to improve detection efficacy and reduce false positives.
- Participate in threat intelligence analysis to anticipate emerging risks and adjust defensive postures.
- Document incidents thoroughly for post-mortem analysis and compliance reporting (SOX, ISO 27001).
- Assist in security audits and assessments, providing evidence and supporting documentation.
Requirements & Qualifications
We need a detail-oriented analyst with a hacker mindset and a passion for defense. The ideal candidate is a clear communicator who can explain technical risks to non-technical stakeholders.
Required Skills & Experience
- 3+ years of hands-on experience in a security operations center (SOC), incident response, or IT security role.
- Proven proficiency with SIEM platforms, IDS/IPS, and endpoint detection and response (EDR) solutions.
- Strong understanding of the cyber kill chain, MITRE ATT&CK framework, and common attack vectors (phishing, malware, ransomware, DDoS).
- Experience with network protocols (TCP/IP, DNS, HTTP/S), Windows/Linux system administration, and cloud infrastructure (AWS, Azure, or GCP).
- Familiarity with scripting for automation (Python, PowerShell, Bash) is a major plus.
- Excellent analytical and problem-solving skills with the ability to work under pressure during security incidents.
- Must be located in a major time zone overlapping with US business hours (EST/PST) for shift coverage.
Preferred Certifications
- CompTIA Security+ or CySA+
- GIAC Certified Incident Handler (GCIH) or GIAC Security Analyst (GSA)
- Certified Ethical Hacker (CEH)
- SANS FOR508 or other SANS incident response certifications.
What We Offer & Benefits
We believe in investing in our people. As a fully remote company, we are built for distributed work and offer a suite of benefits designed for flexibility, growth, and well-being.
- True Remote Flexibility: Work from anywhere. We provide a home office stipend to optimize your setup.
- Competitive Compensation: The salary range above, plus a performance-based bonus and stock options.
- Health & Wellness: 100% premium coverage for medical, dental, and vision insurance for you and dependents. Plus a wellness stipend.
- Professional Growth: Annual budget for certifications, conferences, and training. We encourage you to get certified and stay ahead of threats.
- Time Off: Generous PTO policy, plus company-wide holidays and a mental health day each quarter.
- Tools of the Trade: You choose your laptop (Mac or PC) and we provide all necessary security software and licenses.
- Collaborative Culture: Despite being remote, we connect daily via video. Expect virtual coffee chats, team syncs, and an annual all-hands retreat (location varies).
- Career Path: Clear progression into Senior Analyst, Threat Hunter, or Incident Response Lead roles.
Our Commitment to Security & You
We practice what we preach. Our own security is robust, and we expect you to uphold the highest standards of ethics and confidentiality. We are an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees, regardless of background, identity, or location. If you are ready to be a vital part of a team that values proactive defense and remote work excellence, we want to hear from you.