SOC Investigation Specialist Talent Network
Mercor • Remote • Posted 43 days ago
Education
Any
Type
Pay Rate
$0/task
Posted
43d ago
✅ Applying through this link gives you a verified candidate referral.
Referrals from verified candidates give your profile a visibility boost and help support our platform at no cost to you.
This position is hosted on an external talent platform. Please only apply for this position if it fits your skills and interests.
About this Role
Mercor is hiring SOC Investigation Specialist on behalf of high-growth technology and enterprise partners building next-generation SOC automation and AI-driven investigation systems. This role is ideal for experienced SOC analysts who can apply real-world investigative judgment to review, validate, and construct high-quality security investigations across SIEM, endpoint, cloud, and identity environments.
Review, monitor, and evaluate SOC alerts and investigation outputs based on predefined scenarios and criteria.
Location Requirements
Mercor is hiring SOC Investigation Specialist
Responsibilities
Requirements
Splunk
Nice to Have
Why Join
Mercor is hiring SOC Investigation Specialist on behalf of high-growth technology and enterprise partners building next-generation SOC automation and AI-driven investigation systems. This role is ideal for experienced SOC analysts who can apply real-world investigative judgment to review, validate, and construct high-quality security investigations across SIEM, endpoint, cloud, and identity environments. Review, monitor, and evaluate SOC alerts and investigation outputs based on predefined scenarios and criteria. Distinguish true positives from false positives by validating investigative evidence and alert context. Perform end-to-end security investigations when required, including log analysis, entity pivoting, timeline reconstruction, and evidence correlation. Assess the correctness, completeness, and quality of SOC investigations produced by automated or human workflows. Apply consistent investigative judgment while recognizing that multiple valid investigation paths may exist for the same alert. Make clear binary determinations (e.g., ACCEPT / PASS) while also producing detailed ground-truth investigations when required. Use Splunk extensively to pivot across logs, entities, and timelines, including reading and reasoning about SPL queries. Maintain clear and accurate documentation of investigative steps, assumptions, evidence, and conclusions. Collaborate with program leads and other expert annotators to uphold high-quality investigation and annotation standards. Mentor or support other analysts where applicable, particularly in long-term or lead annotator roles. 3+ years of hands-on experience as a SOC analyst in a production SOC environment (Tier 2 or above strongly preferred). Strong understanding of alert triage, incident investigation workflows, and evidence-based decision-making under time constraints. Mandatory hands-on experience with Splunk, including: Conducting investigations using Splunk Reading, understanding, and reasoning about SPL queries Pivoting between logs, entities, and timelines Proven ability to evaluate SOC investigations and determine whether conclusions are valid, incomplete, or incorrect. Strong investigative judgment and comfort making decisive evaluations. Fluent English (written and spoken) with strong documentation and communication skills. Experience with Endpoint Detection & Response (EDR) tools such as CrowdStrike Falcon, Microsoft Defender for Endpoint, or SentinelOne. Experience analyzing cloud security logs and signals: AWS (CloudTrail, GuardDuty) Azure (Activity Log, Defender for Cloud) GCP (Cloud Audit Logs) Familiarity with Identity & Access Management platforms such as Okta Identity Cloud or Microsoft Entra ID (Azure AD). Experience with email security tools like Proofpoint or Mimecast. SOC leadership or mentoring experience. Basic scripting experience (Python or similar). Security certifications (optional): GCIA, GCIH, GCED, Splunk certifications, Security+, CCNA, or cloud security certifications. Work on cutting-edge SOC automation and AI-driven investigation systems. Apply real-world SOC expertise to shape how future security teams investigate and respond to threats. Take ownership of high-impact investigative evaluations and ground-truth security cases. Collaborate with experienced SOC practitioners, security engineers, and AI teams. Join Mercor’s global network of vetted security professionals. We consider all qualified applicants without regard to legally protected characteristics and provide reasonable accommodations upon request.
- Review, monitor, and evaluate SOC alerts and investigation outputs based on predefined scenarios and criteria.
- Distinguish true positives from false positives by validating investigative evidence and alert context.
- Perform end-to-end security investigations when required, including log analysis, entity pivoting, timeline reconstruction, and evidence correlation.
- Assess the correctness, completeness, and quality of SOC investigations produced by automated or human workflows.
- Apply consistent investigative judgment while recognizing that multiple valid investigation paths may exist for the same alert.
- Make clear binary determinations (e.g., ACCEPT / PASS) while also producing detailed ground-truth investigations when required.
- Use Splunk extensively to pivot across logs, entities, and timelines, including reading and reasoning about SPL queries.
- Maintain clear and accurate documentation of investigative steps, assumptions, evidence, and conclusions.
- Collaborate with program leads and other expert annotators to uphold high-quality investigation and annotation standards.
- Mentor or support other analysts where applicable, particularly in long-term or lead annotator roles.
- 3+ years of hands-on experience as a SOC analyst in a production SOC environment (Tier 2 or above strongly preferred).
- Strong understanding of alert triage, incident investigation workflows, and evidence-based decision-making under time constraints.
- Mandatory hands-on experience with Splunk, including:
Conducting investigations using Splunk
Reading, understanding, and reasoning about SPL queries
Pivoting between logs, entities, and timelines
- Conducting investigations using Splunk
- Reading, understanding, and reasoning about SPL queries
- Pivoting between logs, entities, and timelines
- Proven ability to evaluate SOC investigations and determine whether conclusions are valid, incomplete, or incorrect.
- Strong investigative judgment and comfort making decisive evaluations.
- Fluent English (written and spoken) with strong documentation and communication skills.
- Conducting investigations using Splunk
- Reading, understanding, and reasoning about SPL queries
- Pivoting between logs, entities, and timelines
- Experience with Endpoint Detection & Response (EDR) tools such as CrowdStrike Falcon, Microsoft Defender for Endpoint, or SentinelOne.
- Experience analyzing cloud security logs and signals:
AWS (CloudTrail, GuardDuty)
Azure (Activity Log, Defender for Cloud)
GCP (Cloud Audit Logs)
- AWS (CloudTrail, GuardDuty)
- Azure (Activity Log, Defender for Cloud)
- GCP (Cloud Audit Logs)
- Familiarity with Identity & Access Management platforms such as Okta Identity Cloud or Microsoft Entra ID (Azure AD).
- Experience with email security tools like Proofpoint or Mimecast.
- SOC leadership or mentoring experience.
- Basic scripting experience (Python or similar).
- Security certifications (optional): GCIA, GCIH, GCED, Splunk certifications, Security+, CCNA, or cloud security certifications.
- AWS (CloudTrail, GuardDuty)
- Azure (Activity Log, Defender for Cloud)
- GCP (Cloud Audit Logs)
- Work on cutting-edge SOC automation and AI-driven investigation systems.
- Apply real-world SOC expertise to shape how future security teams investigate and respond to threats.
- Take ownership of high-impact investigative evaluations and ground-truth security cases.
- Collaborate with experienced SOC practitioners, security engineers, and AI teams.
- Join Mercor’s global network of vetted security professionals.
Requirements
- Must be eligible to work in Remote
- Fluent proficiency in English (Written & Verbal)
- Reliable high-speed internet connection
Eligible Languages
Fluent proficiency in English
Compensation Analysis
Mercor is hiring SOC Investigation Specialist on behalf of high-growth technology and enterprise partners building next-generation SOC automation and AI-driven investigation systems. This role is ideal for experienced SOC analysts who can apply real-world investigative judgment to review, validate, and construct high-quality security investigations
Skills & Categories
Explore other opportunities in related specializations:
Related Jobs
Browse All Jobs from Mercor
Discover more opportunities on Mercor that match your skills and interests.
View All Mercor Jobs →Community Reviews
Leave your review
Frequently Asked Questions
Is this for freelancers or full-time employees?
Both. Mercor tries to match you with clients who want long-term contractors. Unlike other platforms where you log in and grab small tasks, Mercor matches you with one company for a steady role (e.g., 'Python Tutor for 3 months').
I'm not comfortable on camera. Can I still apply?
No. The application requires a video interview with an AI avatar. The AI asks you questions about your resume, and the video is shared with potential clients to prove your communication skills.
Does it cost money to join?
No. You should never pay to join these platforms. Mercor makes money by charging the client a fee on top of your hourly rate.
What does the work actually look like?
It is practical, hands-on data work. You might be recording short videos, categorizing images, rating text responses, or analyzing data. The tasks are designed to be short and distinct—typically 5-60 minutes per task.
How flexible is the schedule?
Extremely. This is true "log in and work" flexibility. You can usually work for 20 minutes or 4 hours depending on your availability. There are rarely minimum hour requirements, making it ideal for side income.
Is there an interview?
Usually, no. Hiring for these roles is almost entirely based on passing an automated assessment or "qualification" task. If you pass the test, you get access to the work.
How soon will I start?
Important: Mercor is a talent marketplace, not a task queue. Applying puts you in a pool of candidates. You will only start working when a specific client (like a major AI lab) selects your profile. This matching process can take weeks.