Security Operations Center Associate

United StatesUnited States·Dallasmid
OtherSecurity Operations
0 views0 saves0 applied

Quick Summary

Key Responsibilities

• Serve as the first line of defense by monitoring and triaging security events and alerts across multiple platforms—such as Next-Gen SIEM, Microsoft 365 Defender, AWS native security,

Technical Tools
OtherSecurity Operations

We are at the forefront of transforming the future of technology in the financial industry, and we seek curious, practical individuals to help us pave the way. Our team is not intimidated by taking calculated risks, as they relish a good challenge and are eager to engage in problem-solving. As a member of our team, you will work alongside like-minded experts in a culture that is deeply rooted in innovation and progression. Join us to be part of a transformative journey that can shape the industry's future.

We are seeking a curious and driven Junior SOC Analyst to join our 24/7 Security Operations Center team. In this entry-level role, you will serve as the first line of defense monitoring security tools, triaging alerts, and supporting incident response under the guidance of senior analysts—while building hands-on experience across our enterprise security stack.

Responsibilities

~3 min read

•    Serve as the first line of defense by monitoring and triaging security events and alerts across multiple platforms—such as Next-Gen SIEM, Microsoft 365 Defender, AWS native security, and other enterprise security tools. Follow established playbooks and standard operating procedures (SOPs) to identify anomalous activity, document initial findings, and escalate confirmed or suspicious events to mid-level and senior analysts in a timely manner. 
•    Support the investigation of security incidents by gathering supporting data such as logs, endpoint telemetry, network traffic, and user activity, and providing this context to mid-level and senior analysts. Assist with evidence collection, ticket enrichment, and basic indicator-of-compromise (IOC) lookups using internal tools and external threat intelligence sources. 
•    Build foundational knowledge of common adversary tactics, techniques, and procedures (TTPs) and the MITRE ATT&CK framework by reviewing closed incidents, participating in knowledge-sharing sessions, and assisting senior analysts with threat hunting tasks such as pulling SIEM and EDR data for review. 
•    Maintain accurate, clear, and complete documentation of every alert, investigation, and ticket worked, including timestamps, actions taken, and escalation details. Contribute to shift handoff notes and post incident summaries so that mid-level and senior analysts have the context needed to continue or close out work. 
•    Work closely with mid-level and senior SOC analysts and engineers to learn the organization’s detection and response workflows, ask questions, and apply feedback from peer reviews. Engage with internal technology teams—including IT, Help Desk, and end users—to validate alerts and gather information needed to triage events. 
•    Adhere to established Security Operations Center service-level agreements (SLAs) for alert triage, escalation, and ticket updates. Continuously develop technical knowledge through on-the-job training, internal labs, vendor documentation, and self-study, and pursue relevant industry certifications to grow toward a Tier 2 / mid-level analyst role. 
•    Participate in the SOC on call rotation, with a primary focus on the immediate acknowledgement of SOC tickets and cases within defined SLA timeframes. Provide initial documentation of tickets and cases—capturing alert details, timestamps, affected assets, and initial observations—and escalate to mid-level or senior analysts in accordance with established escalation procedures to support 24/7 operational coverage. 
•    Participate in other duties as assigned to support overall Security Operations Center efficiency and organizational objectives.  

What you will have:

•    0–2 years of professional experience in IT, networking, help desk, or cybersecurity; recent graduates with relevant coursework, internships, or home lab experience are encouraged to apply. 
•    Foundational understanding of, or exposure to, enterprise security tools such as SIEM platforms, M365 Security Suite, EDR solutions, email security, vulnerability management, or similar tools (academic, lab, internship, or production exposure all count). 
•    Working knowledge of core networking concepts (TCP/IP, DNS, HTTP/S, VPN), operating systems (Windows and Linux), and common attack types (phishing, malware, brute force, etc.). 
•    Strong written and verbal communication skills, attention to detail, a curious and methodical approach to problem-solving, and willingness to participate in an on-call rotation that may include nights, weekends, and holidays.

Nice to Have

~1 min read

•    Relevant certifications such as CompTIA Security+, Network+, CySA+, (ISC)² CC, or Blue Team Level 1 (BTL1) are highly desirable; a degree in Cybersecurity, Computer Science, Information Systems, or a related field is a plus but not required.

 

Location & Eligibility

Where is the job
Dallas, United States
On-site at the office
Who can apply
US

Listing Details

Posted
May 22, 2026
First seen
May 22, 2026
Last seen
May 23, 2026

Posting Health

Days active
0
Repost count
0
Trust Level
51%
Scored at
May 22, 2026

Signal breakdown

freshnesssource trustcontent trustemployer trust

3 other jobs at Cetera Financial Group Inc

View all →

Explore open roles at Cetera Financial Group Inc.

Newsletter

Stay ahead of the market

Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.

A
B
C
D
Join 12,000+ marketers

No spam. Unsubscribe at any time.

Cetera Financial Group IncSecurity Operations Center Associate