top of page
Security Awareness Work-from-Home Deployment Kit
SecurityPlus Logo Certified CE.jpg
nuc-mini-pc-solutions.png
isc-candidate.png

Ready to save? Trade in today.

Receive an Amazon.com Gift Card for your used electronics, get discounts towards new eligible Amazon devices, and give your old device a new life.

fiber-article-thumbnail.png
SOC Analyst (Contractor) 
  • Actively monitor and investigate security alerts to detect malicious activity at our clients during your shift in our 24x7x365 SOC.

  • Perform Cyber Kill Chain and MITRE ATT&CK analysis on incoming security alerts.

  • Follow documented procedures to properly triage and respond to identified malicious activity, such as escalation or remediation actions.

  • Provide our clients with clear/concise written investigations within the Binary Defense service management system.

  • Communicate and collaborate with Binary Defense clients through the lifecycle of all escalated security investigations.

  • Contribute to general security operations across all clients in the Binary Defense portfolio, whether through escalations, regular meetings, etc.

  • Participate in internal meetings, such as shift turn over, team meetings, etc. to collaborate with your fellow team members and perform knowledge transfer.

  • Perform regular training to stay sharp on the latest technologies, methodologies, etc. (Binary Defense will sponsor this training).

  • Stay up-to-date on the latest vulnerabilities, threats, and attacks around the world.

  • Be a team player and interface regularly with your shift mates and colleagues.

based on  hourly rate

  • Being the point of escalation and performing security analysis of the most critical endpoint alerts (MDR)

  • Applying your expertise to piece together the attack chain across customers complex environments including cloud, identity, email, network, and endpoint (MXDR)

  • Participating in various stages of incident investigations including taking decisive steps to respond to active breaches and protect our customers

  • Threat hunting across customers environments searching for attackers or remnants of their activity

  • Analysis and research into new, emerging, or trending attacks, actors, malware samples and TTPs

  • Ability to collect, process, and exploit OSINT to facilitate the creation of better hunting queries and contribute the creation of Threat Alerts.

  • Engaging in customer-facing interactions at all levels from SOC analysts to c-suite executives



 

based on  hourly rate

DATA-CENTER Hosting 

8 Bit Technology opened a new Data-center in 2018 and is looking to expand.

With the rising demand of cryptocurrency miners looking for high density power, advanced cooling and secure space, we have developed a secure data-center that is "miner friendly.)

Physical Security from Intruders

We offer a non-windowed, secure access panel door-entry facility.   To ensure that there are no intruders wandering through the facility, no other activity happens in this building. We mitigate the risk of intruders with recorded, High-definition security cameras inside and outside the server rooms.

Climate Control

We planned for temperate climate in the data center, which is yet another aspect of the physical security. In a center such as this, where there are a large number of servers and machines running at the same time, the temperature is going to be quite high. Our company uses liquid immersion  method of keeping things cool and ensuring that the machines do not overheat or even catch fire. 

Digital Security

While physical cryptocurrency security is important, you can’t forget about the digital security. Our facility is capable of keeping you and all of the others who are using it safe from hackers and the like through both hardware and software firewalls/security gateways.

Redundancy

What would happen if you happened to lose power to your machine for a few hours? It would mean that you would not be mining, and you would not be making a profit. You do not want that to happen, so we offer the security of redundant power. This means that even if there were a power outage, our data center is still going to have power available to make sure your machines are up and working like they should be. The same is true when it comes to Internet connectivity. 8 Bit tech has a 100% up-time fiber source  in place to ensure that you can always be mining.

Location

When you are choosing a company for your data center, you want to consider their location. This is important for the cost of electricity, of course, but it is also important for security. You want to choose a data center that is not in a geographically dangerous zone, so there is less of a chance of catastrophic loss.  We have chosen the correct building and location to meet this demand.  Tested by the latest Hurricane Florence issue, we had not downtime, loss of power, or connectivity.

 Reputation and History of the Company

If you want to make sure you are working with a quality company that has excellent security, one of the best things to do is look at their reputation. What do other people have to say about the company? Have they had any trouble? How long has the company been in business, and have they ever had any types of security troubles in the past? Always learn as much as you can about a company before you make your choice.  Please check our social links, local newspapers and you will find that we are rock solid.

We are a new miner host with no minimums. New space and power will be available in May/June. They are taking reservations now at the following S9 all in rates – $195 (3 months in advance), $170 (6 months in advance) and $155 (12 months in advance).
 

Iqmining_160x600_3.3_3 years.gif
cve_completed_s.jpg
office365.jpg
MSO From Home Ad.jpg
Ed 2 Go Ad.jpg
Dell Ad.jpg
Ivacy VPN Ad.png
Smart Home Ad.jpg
Microsoft Pro Write Ad.png
NewEgg Ad.jpg
Winston Security Ad.png
bottom of page