This position has been filled
This job is no longer accepting applications. Browse open EdTech jobs or view current openings at Nelnet or search for Security Operations Center Analyst jobs.
Summary
Tier 1 SOC Analyst role at Nelnet focused on monitoring and triaging security alerts to defend against cyber threats. This entry-level position serves as the first line of response in a 24/7 remote environment with on-call rotation support.
Job Description
Fast Facts
Join Nelnet as a Tier 1 SOC Analyst, where you'll play a key role in cybersecurity defense by monitoring and responding to security alerts in a fast-paced remote environment.
Responsibilities: Monitor and triage security alerts across various tools, escalate potential threats, assist in incident response, and stay updated on cybersecurity trends.
Skills: Experience in cybersecurity or IT support, familiarity with SIEM and EDR/XDR tools, strong analytical skills, and excellent communication abilities.
Qualifications: 1–3 years in a cybersecurity role, knowledge of networking concepts, and interest in AI applications in cybersecurity preferred certifications like CompTIA Security+ are a plus.
Location: Remote - Nebraska, USA
Compensation: $75000 - $90000 / Annually
Nelnet is a diversified and innovative company committed to enriching lives through the power of service as a student loan servicer, professional services company, consumer loan originator and servicer, payments processor, renewable energy solutions, and K-12 and higher education expert. For over 40 years, Nelnet has been serving its customers, associates, and communities.
The perks of working at Nelnet go beyond our benefits package. When you join the Nelnet team, you're part of a community invested in the success of each individual. That support comes through in our work, as we are united by our mission of creating opportunities for people where they live, learn, and work.
The Tier 1 – Security Operations Center (SOC) Analyst plays a foundational role in the organization’s cybersecurity defense strategy. As the first line of response, this entry-level position is responsible for monitoring, triaging, and escalating security alerts across a variety of tools and platforms. Analysts will participate in an on-call rotation to support timely identification and escalation of potential threats, ensuring coverage during critical periods outside of standard business hours.
Responsibilities:
- Monitor and triage security alerts from SIEM, IDS/IPS, firewalls, EDR/XDR, and other security tools.
- Perform initial investigation and classification of events to determine if they represent potential security incidents.
- Escalate confirmed or suspicious incidents to Tier 2 analysts with detailed documentation.
- Work with security tools that incorporate threat and artificial intelligence to support alert triage and contextual analysis.
- Assist in maintaining and tuning SIEM use cases and correlation rules.
- Participate in routine threat hunting activities using predefined queries and AI-augmented tools.
- Document findings, update incident tickets, and contribute to knowledge base articles and playbooks.
- Support incident response efforts by gathering logs, indicators of compromise (IOCs), and other relevant data.
- Stay current on emerging threats, vulnerabilities, and attacker tactics, techniques, and procedures (TTPs).
**Pay Range for this role is - $75,000 - $90,000
Minimum Qualifications:
- 1–3 years of experience in a cybersecurity, IT support, or SOC environment.
- Familiarity with SIEM platforms (e.g., Splunk, Google SecOps, or Microsoft Sentinel).
- Familiarity with EDR/XDR tools (e.g., CrowdStrike, SentinelOne, Microsoft Defender).
- Basic understanding of networking concepts (TCP/IP, DNS, HTTP, etc.).
- Exposure to cybersecurity concepts such as malware, phishing, and threat actors.
- Awareness of cyber threat intelligence and its role in detection and response.
- Interest in AI/ML applications in cybersecurity (e.g., anomaly detection, automated triage).
- Strong analytical and problem-solving skills.
- Excellent written and verbal communication skills.
- Willingness to work in a 24/7 or rotating shift environment.
Preferred Qualifications:
- CompTIA Security+, GSEC, BTL1 or equivalent entry-level certification.
- Exposure to scripting or automation (e.g., Python, PowerShell, Bash).
- Hands-on experience with cybersecurity labs, Capture the Flag (CTF) events, or home labs.
- Understanding of MITRE ATT&CK framework and how it applies to detection.
Our benefits package includes medical, dental, vision, HSA and FSA, generous earned time off, 401K/student loan repayment, life insurance & AD&D insurance, employee assistance program, employee stock purchase program, tuition reimbursement, performance-based incentive pay, short- and long-term disability, and a robust wellness program. Click here to learn more about our benefits: LINK.
Nelnet is committed to providing a welcoming and respectful workplace where all associates have the opportunity to succeed. As an Equal Opportunity Employer, we ensure that all qualified applicants are considered for employment. Employment decisions are made without regard to race, color, religion/creed, national origin, gender, sex, marital status, age, disability, use of a guide dog or service animal, sexual orientation, military/veteran status, or any other status protected by federal, state, or local law. We value the unique contributions of every team member and believe that a positive work environment benefits everyone.
Qualified individuals with disabilities who require reasonable accommodations in order to apply or compete for positions at Nelnet may request such accommodations by contacting Corporate Recruiting at 402-486-5725 orcorporaterecruiting@nelnet.net.
Nelnet is a Drug Free and Tobacco Free Workplace.

