Quick Summary
BitGo is the leading infrastructure provider of digital asset solutions, delivering custody, wallets, staking, trading, financing, and settlement services from regulated cold storage. Since our founding in 2013, we have focused on enabling our clients to securely navigate the digital asset space.
Review and triage security alerts from a wide variety of sources Carefully tune rules to reduce false positives Write new rules to ensure appropriate MITRE ATT&CK framework coverage Escalate potential incidents Assist in any incident response…
We are looking for teammates who share and practice our values: open communication, transparency, taking ownership, and a high level of craftsmanship. We are looking for coworkers who share our vision and mission: deliver trust in digital assets.
BitGo is the leading infrastructure provider of digital asset solutions, delivering custody, wallets, staking, trading, financing, and settlement services from regulated cold storage. Since our founding in 2013, we have focused on enabling our clients to securely navigate the digital asset space. With a global presence and multiple Trust companies, BitGo serves thousands of institutions, including many of the industry's top brands, exchanges, and platforms, and millions of retail investors worldwide. As the operational backbone of the digital economy, BitGo handles a significant portion of Bitcoin network transactions and is the largest independent digital asset custodian, and staking provider, in the world. For more information, visit www.bitgo.com.
We are looking for a versatile SOC Analyst to join the team and write, tune and respond to alerts covering the entire environment from endpoints to cloud infrastructure. This exciting opportunity empowers you to ensure the right alerts come in and you don’t burn out on false positives. Your work would take place during regular business hours. Weekend coverage will be necessary. From time to time evenings as well. The expectation is that we build for 24x7 coverage but you will be asked to step in to assist the team.
Responsibilities
~1 min read- →Review and triage security alerts from a wide variety of sources
- →Carefully tune rules to reduce false positives
- →Write new rules to ensure appropriate MITRE ATT&CK framework coverage
- →Escalate potential incidents
- →Assist in any incident response activities
- →Run projects from beginning to end to level up security monitoring
- →Work with Engineering and IT on visibility coverage and detection
We are looking for teammates who share and practice our values: open communication, transparency, taking ownership, and a high level of craftsmanship. We are looking for coworkers who share our vision and mission: deliver trust in digital assets.
- 4+ years responding to alerts and similar role
- Familiar with MITRE ATT&CK framework
- Comfortable writing and tuning detection rules
- Experience triaging alerts and establishing if an event rises to an incident
- Varied exposure to a variety of application, SaaS, cloud and end-point logs
- Strong communication skills towards technical and non-technical people
- Preference for people who have experienced a real-life security incident that they detected
What We Offer
~1 min readLocation & Eligibility
Listing Details
- Posted
- May 1, 2026
- First seen
- May 1, 2026
- Last seen
- May 5, 2026
Posting Health
- Days active
- 3
- Repost count
- 0
- Trust Level
- 67%
- Scored at
- May 5, 2026
Signal breakdown
Please let Bitgo know you found this job on Jobera.
Similar Soc Analyst jobs
View all →Browse Similar Jobs
Stay ahead of the market
Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.
No spam. Unsubscribe at any time.
