Create New Account
Sign up to continue searching for suitable jobs in Web 3.0

OR
Terms of Use
Already have an account?

Log In to Your Account
Log in to continue searching for suitable jobs in Web 3.0

OR
Don’t have an account?
Keyrock
SOC Analyst Level 1
about 12 hours ago | 21 views | Be the first one to apply

SOC Analyst Level 1

Full-time
Remote

About the company

Founded in Belgium in 2017, Keyrock are cryptocurrency market makers building scalable, self-adaptive algorithmic technologies to support efficient digital asset markets. Through a combination of in-house algorithmic trading tools, high-frequency trading infrastructure and industry expertise, Keyrock provides unparalleled liquidity services to tokens, exchanges and brokerages within the cryptocurrency ecosystem. Keyrock operates with the vision of democratizing cryptocurrency liquidity through a strict dedication to transparency, operational integrity and regulatory compliance.

Job Summary

What You’ll Do (Core Responsibilities)

📍24/7 monitoring and alert triage across SIEM/EDR/cloud security tooling; identify false positives vs. credible threats and set appropriate severity. 📍Initial investigation and enrichment: gather relevant logs/telemetry, add context, and document findings clearly in the case/ticketing system. 📍Escalation and coordination: escalate confirmed/suspected incidents quickly and cleanly to L2/IR with a complete handoff (timeline, scope, IOCs, actions taken). 📍Runbook execution: follow SOPs for common events (phishing, suspicious logins, endpoint detections, cloud key/token risk, malware alerts, data exfiltration signals), including containment actions you’re authorized to perform. 📍Threat-aware analysis: map alerts to adversary behaviors (e.g., MITRE ATT&CK techniques) to improve understanding and escalation quality. 📍Operational hygiene: maintain accurate shift handovers, update watchlists and investigation notes, and identify recurring alert patterns for tuning recommendations.

What We’re Looking For (Minimum Qualifications)

📍0–2 years in a SOC / security monitoring / IT operations role (or equivalent hands-on experience, internships, labs). 📍Practical knowledge of security fundamentals: networking, DNS, HTTP(S), identity/authentication, and malware basics. 📍Familiarity with log investigation and event triage concepts. 📍Familiarity with common security tools and workflows (any of the following): SIEM (Splunk/Elastic/Sentinel), EDR (CrowdStrike/Defender), ticketing (Jira/ServiceNow), basic SOAR concepts. 📍Strong written communication: produce clear, escalation-ready tickets and timelines. 📍Ability to work rotating shifts/on-call (as required), including weekends/holidays depending on coverage model.

If you’re passionate about blockchain and decentralized technologies, explore more opportunities in web3 and cryptocurrency careers.

Salaries for similar jobs:

Similar jobs

about 12 hours ago | 19 views | Be the first one to apply
Full-time
India
about 12 hours ago | 25 views | Be the first one to apply
Full-time
Remote
about 13 hours ago | 17 views | Be the first one to apply
Full-time
Hong Kong, Asia
about 13 hours ago | 22 views | Be the first one to apply
Full-time
Switzerland, Europe
1 day ago | 307 views | Be the first one to apply
Full-time
Chicago, North America