RedHelm is redefining what it means to be a technology partner. We deliver industry-leading offensive and defensive cybersecurity alongside full-stack IT services that are integrated by design — protecting, powering, and accelerating our clients’ success.
Our teams operate at the intersection of security and technology, combining deep technical expertise with a holistic, client-centered approach. By aligning security strategy, infrastructure, and operational excellence, we help organizations stay resilient in an increasingly complex threat landscape.
At RedHelm, we are building an environment where innovation, accountability, and collaboration drive meaningful outcomes, both for our clients and for the professionals who support them.
Role Overview
The SOC Analyst I is responsible for monitoring, analyzing, and responding to security alerts, events, and incidents in accordance with established procedures and playbooks. This role requires sound analytical judgment, strong documentation skills, and the ability to communicate findings clearly and professionally.
The SOC Analyst I can independently triage and investigate common alert types, recognize patterns and indicators of compromise, and escalate incidents appropriately.
Main Responsibilities
- Monitor, triage, and respond to security alerts, events, and incidents following defined SOC procedures and playbooks
- Perform initial investigations to determine alert validity, scope, and potential impact
- Accurately document investigations, actions taken, and outcomes in the ticketing system
- Independently handle routine and low-to-moderate severity alerts and escalate higher-risk incidents as required
- Identify patterns, recurring alerts, or anomalies and document findings for review by senior analysts
- Communicate investigation findings clearly and professionally with internal teams and customers
- Assist in identifying potential security gaps or misconfigurations and escalate observations appropriately
- Support the monitoring and day-to-day operation of security tools and platforms
- Follow all information security, privacy, and data protection policies when handling client data
- Contribute to the maintenance and improvement of SOC documentation, procedures, and playbooks
- Stay informed on common attack techniques, emerging threats, and relevant vulnerabilities
- Maintain focus and accuracy while working in a fast-paced, alert-driven environment
Required Experience
- Exposure to a SOC, NOC, IT support, or similar technical operations environment.
- Familiarity with security monitoring concepts, incident response workflows, or alert handling
- Experience working with ticketing systems or case management tools
- Academic, internship, lab, or entry-level professional experience in cybersecurity, IT, or related fields is acceptable
Required Skills
- Strong written and verbal communication skills, particularly in documenting and explaining technical findings
- Solid understanding of networking and security fundamentals
- Ability to analyze alerts, logs, and events to determine appropriate response
- Attention to detail and consistency in documentation and process adherence
- Ability to prioritize workload and follow escalation procedures
- Basic familiarity with scripting or automation concepts is a plus
- Customer-focused mindset with the ability to remain calm and professional during incidents
Required Qualifications and Certifications
- Associate’s or Bachelor’s degree in a relevant field, or equivalent professional experience
- Security+ or similar foundational security certification preferred but not required
Additional Information
- Must undergo and pass federal and state background checks and credit checks
Compensation
- Competitive rate of $22/hour
Information Security & Data Privacy Responsibility
All employees are responsible for adhering to company Information Security and Privacy Policies and ensuring that all applicable procedures are consistently followed. This includes safeguarding client and company data to maintain its security, availability, and confidentiality, and upholding all legal and regulatory obligations related to data protection. Employees are expected to perform their duties in a manner that prevents security breaches or incidents that compromise business operations, client data, client data, or the company’s financial and operational standing.
This is an exciting time to join RedHelm as we continue to grow and innovate as a full-stack technology partner. Our integrated approach to offensive security, defensive operations, and IT services creates opportunities to work on complex challenges that directly impact the organizations we serve. As we expand our capabilities and footprint, our team members play a meaningful role in shaping what comes next.
We are equally committed to investing in our people. We believe in a culture where we care about individuals not just for their professional ambitions, but for their personal goals as well. We recognize that work is part of a larger purpose in each person’s life, and that philosophy drives how we support growth, flexibility, and long-term development across our organization.
We offer a comprehensive and competitive benefits package designed to support both career progression and personal wellbeing, including medical, dental, and vision coverage, a 401(k) program, paid time off, floating holidays, and paid holidays. More importantly, we provide an environment where you can build meaningful expertise, contribute to forward-thinking solutions, and grow alongside a company that is actively shaping its future.
Similar Jobs
What you need to know about the Austin Tech Scene
Key Facts About Austin Tech
- Number of Tech Workers: 180,500; 13.7% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Dell, IBM, AMD, Apple, Alphabet
- Key Industries: Artificial intelligence, hardware, cloud computing, software, healthtech
- Funding Landscape: $4.5 billion in VC funding in 2024 (Pitchbook)
- Notable Investors: Live Oak Ventures, Austin Ventures, Hinge Capital, Gigafund, KdT Ventures, Next Coast Ventures, Silverton Partners
- Research Centers and Universities: University of Texas, Southwestern University, Texas State University, Center for Complex Quantum Systems, Oden Institute for Computational Engineering and Sciences, Texas Advanced Computing Center

