Security Operations Center Associate
Quick Summary
• Serve as the first line of defense by monitoring and triaging security events and alerts across multiple platforms—such as Next-Gen SIEM, Microsoft 365 Defender, AWS native security,
We are at the forefront of transforming the future of technology in the financial industry, and we seek curious, practical individuals to help us pave the way. Our team is not intimidated by taking calculated risks, as they relish a good challenge and are eager to engage in problem-solving. As a member of our team, you will work alongside like-minded experts in a culture that is deeply rooted in innovation and progression. Join us to be part of a transformative journey that can shape the industry's future.
We are seeking a curious and driven Junior SOC Analyst to join our 24/7 Security Operations Center team. In this entry-level role, you will serve as the first line of defense monitoring security tools, triaging alerts, and supporting incident response under the guidance of senior analysts—while building hands-on experience across our enterprise security stack.
Responsibilities
~3 min read• Serve as the first line of defense by monitoring and triaging security events and alerts across multiple platforms—such as Next-Gen SIEM, Microsoft 365 Defender, AWS native security, and other enterprise security tools. Follow established playbooks and standard operating procedures (SOPs) to identify anomalous activity, document initial findings, and escalate confirmed or suspicious events to mid-level and senior analysts in a timely manner.
• Support the investigation of security incidents by gathering supporting data such as logs, endpoint telemetry, network traffic, and user activity, and providing this context to mid-level and senior analysts. Assist with evidence collection, ticket enrichment, and basic indicator-of-compromise (IOC) lookups using internal tools and external threat intelligence sources.
• Build foundational knowledge of common adversary tactics, techniques, and procedures (TTPs) and the MITRE ATT&CK framework by reviewing closed incidents, participating in knowledge-sharing sessions, and assisting senior analysts with threat hunting tasks such as pulling SIEM and EDR data for review.
• Maintain accurate, clear, and complete documentation of every alert, investigation, and ticket worked, including timestamps, actions taken, and escalation details. Contribute to shift handoff notes and post incident summaries so that mid-level and senior analysts have the context needed to continue or close out work.
• Work closely with mid-level and senior SOC analysts and engineers to learn the organization’s detection and response workflows, ask questions, and apply feedback from peer reviews. Engage with internal technology teams—including IT, Help Desk, and end users—to validate alerts and gather information needed to triage events.
• Adhere to established Security Operations Center service-level agreements (SLAs) for alert triage, escalation, and ticket updates. Continuously develop technical knowledge through on-the-job training, internal labs, vendor documentation, and self-study, and pursue relevant industry certifications to grow toward a Tier 2 / mid-level analyst role.
• Participate in the SOC on call rotation, with a primary focus on the immediate acknowledgement of SOC tickets and cases within defined SLA timeframes. Provide initial documentation of tickets and cases—capturing alert details, timestamps, affected assets, and initial observations—and escalate to mid-level or senior analysts in accordance with established escalation procedures to support 24/7 operational coverage.
• Participate in other duties as assigned to support overall Security Operations Center efficiency and organizational objectives.
What you will have:
• 0–2 years of professional experience in IT, networking, help desk, or cybersecurity; recent graduates with relevant coursework, internships, or home lab experience are encouraged to apply.
• Foundational understanding of, or exposure to, enterprise security tools such as SIEM platforms, M365 Security Suite, EDR solutions, email security, vulnerability management, or similar tools (academic, lab, internship, or production exposure all count).
• Working knowledge of core networking concepts (TCP/IP, DNS, HTTP/S, VPN), operating systems (Windows and Linux), and common attack types (phishing, malware, brute force, etc.).
• Strong written and verbal communication skills, attention to detail, a curious and methodical approach to problem-solving, and willingness to participate in an on-call rotation that may include nights, weekends, and holidays.
Nice to Have
~1 min read• Relevant certifications such as CompTIA Security+, Network+, CySA+, (ISC)² CC, or Blue Team Level 1 (BTL1) are highly desirable; a degree in Cybersecurity, Computer Science, Information Systems, or a related field is a plus but not required.
Location & Eligibility
Listing Details
- Posted
- May 22, 2026
- First seen
- May 22, 2026
- Last seen
- May 23, 2026
Posting Health
- Days active
- 0
- Repost count
- 0
- Trust Level
- 51%
- Scored at
- May 22, 2026
Signal breakdown
Please let Cetera Financial Group Inc know you found this job on Jobera.
3 other jobs at Cetera Financial Group Inc
View all →Explore open roles at Cetera Financial Group Inc.
Similar Security Operations jobs
View all →Browse Similar Jobs
Stay ahead of the market
Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.
No spam. Unsubscribe at any time.