Keyrock Logo

Keyrock

SOC Analyst (Level 1)

Posted 7 Days Ago
In-Office or Remote
17 Locations
Entry level
In-Office or Remote
17 Locations
Entry level
As a SOC Analyst (Level 1), you will monitor security alerts, investigate incidents, and escalate findings in a fast-paced trading environment.
The summary above was generated by AI
About Keyrock

Since our beginnings in 2017, we've grown to be a leading change-maker in the digital asset space, renowned for our partnerships and innovation.

Today, we rock with over 200 team members around the world. Our diverse team hails from 42 nationalities, with backgrounds ranging from DeFi natives to PhDs. Predominantly remote, we have hubs in London, Brussels, Singapore and Paris, and host regular online and offline hangouts to keep the crew tight.

We are trading on more than 80 exchanges, and working with a wide array of asset issuers. As a well-established market maker, our distinctive expertise led us to expand rapidly. Today, our services span market making, options trading, high-frequency trading, OTC, and DeFi trading desks as well as digital asset management. Keyrock is looking to expand and establish itself as a full-service financial institution through both organic innovation and inorganic growth.

But we’re more than a service provider. We’re an initiator. We're pioneers in adopting the Rust Development language for our algorithmic trading systems, and champions of its use in the industry. We support the growth of Web3 startups through our Accelerator Program. We upgrade ecosystems by injecting liquidity into promising DeFi, RWA, and NFT protocols. And we push the industry's progress with our research and governance initiatives.

At Keyrock, we're not just envisioning the future of digital assets. We're actively building it.

Role Summary

As a SOC Analyst (Level 1), you are the first line of defense for monitoring, triaging, and escalating security alerts across Keyrock’s cloud-first, high-availability trading environment. You will follow playbooks/runbooks to validate alerts, enrich investigations with context, and ensure timely escalation to Level 2/Incident Response.

What You’ll Do (Core Responsibilities)
  • 24/7 monitoring and alert triage across SIEM/EDR/cloud security tooling; identify false positives vs. credible threats and set appropriate severity.

  • Initial investigation and enrichment: gather relevant logs/telemetry, add context, and document findings clearly in the case/ticketing system.

  • Escalation and coordination: escalate confirmed/suspected incidents quickly and cleanly to L2/IR with a complete handoff (timeline, scope, IOCs, actions taken).

  • Runbook execution: follow SOPs for common events (phishing, suspicious logins, endpoint detections, cloud key/token risk, malware alerts, data exfiltration signals), including containment actions you’re authorized to perform.

  • Threat-aware analysis: map alerts to adversary behaviors (e.g., MITRE ATT&CK techniques) to improve understanding and escalation quality.

  • Operational hygiene: maintain accurate shift handovers, update watchlists and investigation notes, and identify recurring alert patterns for tuning recommendations.

What We’re Looking For (Minimum Qualifications)
  • 0–2 years in a SOC / security monitoring / IT operations role (or equivalent hands-on experience, internships, labs).

  • Practical knowledge of security fundamentals: networking, DNS, HTTP(S), identity/authentication, and malware basics.

  • Familiarity with log investigation and event triage concepts.

  • Familiarity with common security tools and workflows (any of the following): SIEM (Splunk/Elastic/Sentinel), EDR (CrowdStrike/Defender), ticketing (Jira/ServiceNow), basic SOAR concepts.

  • Strong written communication: produce clear, escalation-ready tickets and timelines.

  • Ability to work rotating shifts/on-call (as required), including weekends/holidays depending on coverage model.

Nice to Have (Preferred)
  • Cloud security exposure (AWS/GCP/Azure): CloudTrail/Activity Logs, IAM analysis, detections for token/key misuse.

  • Familiarity with incident response frameworks/processes (e.g., NIST incident response guidance).

  • Exposure to detection engineering concepts (rule tuning, false-positive reduction), or basic scripting (Python/Bash) for investigation automation.

  • Knowledge of the digital-asset ecosystem (exchanges, custody concepts, operational risk in 24/7 trading environments).

  • Certifications (optional): Security+, Blue Team Level 1, SSCP, or equivalent practical training.

What Success Looks Like (First 60–90 Days)
  • Consistently accurate triage decisions with strong documentation and clean escalations.

  • Reliable shift handovers and measurable reduction in re-opened or incomplete cases.

  • Clear recommendations for detection/playbook improvements based on recurring patterns.

Why Keyrock
  • Work in a fast-moving, globally distributed environment shaping the future of digital financial markets.

  • A culture that expects ownership, learning, and continuous improvement.

Top Skills

Crowdstrike
Defender
Edr
Elastic
JIRA
Sentinel
Servicenow
SIEM
Splunk

Similar Jobs

10 Hours Ago
Easy Apply
Remote
30 Locations
Easy Apply
132K-282K Annually
Senior level
132K-282K Annually
Senior level
Cloud • Security • Software • Cybersecurity • Automation
Lead the design and implementation of GitLab's authentication infrastructure, focusing on security and performance. Collaborate with multiple teams to ensure effective identity services and support a transition to zero-trust architecture.
Top Skills: Ai-Powered DevsecopsCi/CdDistributed SystemsEnvoyGitopsGoGoogle SpannerGrpcHaproxyKubernetesNginxPostgresProxy TechnologiesRdsRest ApisRustTraefik
10 Hours Ago
Easy Apply
Remote
31 Locations
Easy Apply
Mid level
Mid level
Cloud • Security • Software • Cybersecurity • Automation
The role involves developing features for GitLab's AI-powered platform, advocating for quality improvements, and collaborating within a remote team.
Top Skills: AIGraphQLJavaScriptPythonRspecRuby On RailsVue
Yesterday
Remote or Hybrid
Italy
Senior level
Senior level
Security • Cybersecurity
Manage and grow accounts in Italy, driving new business, utilizing consultative sales to address security challenges, and ensuring customer success with Tufin solutions.
Top Skills: Cloud SecurityFirewall ManagementNetwork SecuritySecurity Policy Automation

What you need to know about the Chicago Tech Scene

With vibrant neighborhoods, great food and more affordable housing than either coast, Chicago might be the most liveable major tech hub. It is the birthplace of modern commodities and futures trading, a national hub for logistics and commerce, and home to the American Medical Association and the American Bar Association. This diverse blend of industry influences has helped Chicago emerge as a major player in verticals like fintech, biotechnology, legal tech, e-commerce and logistics technology. It’s also a major hiring center for tech companies on both coasts.

Key Facts About Chicago Tech

  • Number of Tech Workers: 245,800; 5.2% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: McDonald’s, John Deere, Boeing, Morningstar
  • Key Industries: Artificial intelligence, biotechnology, fintech, software, logistics technology
  • Funding Landscape: $2.5 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Pritzker Group Venture Capital, Arch Venture Partners, MATH Venture Partners, Jump Capital, Hyde Park Venture Partners
  • Research Centers and Universities: Northwestern University, University of Chicago, University of Illinois Urbana-Champaign, Illinois Institute of Technology, Argonne National Laboratory, Fermi National Accelerator Laboratory

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account