
SOC Analyst - Email Threat Specialist
$40 - $100/hourpay
Required Skills
Blue Teaming
Authentication Protocol Mastery
Adversarial Intent Classification
Business Process Fraud Awareness
Advanced Header Forensics
Email Security
Thread Detection Analysis
Job Description
Job Title: SOC Analyst (Email Threat Specialist)
Job Type: Part-time or Full-time, contract
Location: Remote, United States
Job Summary
As a SOC Analyst (Email Threat Specialist), you'll leverage your expertise in phishing and BEC triage to evaluate, classify, and document complex email threats. You will play a pivotal role in dissecting each email’s content and metadata, refining AI models, and fortifying defenses against real-world adversarial attacks. This is an exciting opportunity for cybersecurity professionals passionate about hands-on threat analysis and proactive blue teaming.
Key Responsibilities
- Thoroughly review and analyze incoming emails, assessing both content and metadata to determine malicious intent.
- Classify emails according to specific security threats such as phishing, business email compromise (BEC), malware, and spoofing based on industry criteria.
- Perform advanced forensic analysis of email headers to uncover sophisticated attack vectors, including authentication anomalies and domain spoofing.
- Apply authentication protocol expertise (SPF, DKIM, DMARC) to evaluate sender legitimacy and identify reply-to mismatches.
- Leverage knowledge of business process fraud to detect targeted adversarial activity and prevent organizational risk.
- Document findings and articulate detailed security incident reports with a focus on accuracy, clarity, and actionable intelligence.
- Support the training of AI-driven security systems by providing expert-level annotations and threat classifications.
Required Skills and Qualifications
- 2+ years of professional experience in cybersecurity, preferably in a SOC environment.
- Expertise in blue teaming with a strong foundation in threat detection and analysis.
- Proven experience triaging phishing, BEC, or other advanced email-based attacks.
- Proficient in reading and interpreting complex email headers and authentication protocols (SPF, DKIM, DMARC).
- Skilled in adversarial intent classification and discerning subtle threat indicators within high-volume, high-malicious-rate environments (75–80%).
- Deep understanding of business process fraud and its mechanisms.
- Exceptional written and verbal communication skills, with meticulous attention to detail in documentation and reporting.
Preferred Qualifications
- Experience supporting AI or security automation tools through threat data annotation or training.
- Advanced knowledge of header forensics and sophisticated phishing detection methods.
- Relevant cybersecurity certifications (e.g., SSCP, CEH, CySA+).