Staff SOC Analyst driving advanced threat detection and incident response for Sunrun's security team. Leading complex investigations, mentoring analysts, and improving detection capabilities in a remote setup.
Responsibilities
Serve as the senior technical expert within the SOC, providing advanced analysis, guidance, and escalation support for complex security incidents and investigations.
Lead threat detection and monitoring efforts, ensuring high-quality alerting, correlation logic, and continuous tuning of SIEM, EDR, and related security tools.
Participate in incident response operations, coordinating containment, eradication, and recovery actions across teams while maintaining situational awareness and clear communication.
Develop and enhance detection content, including use cases, correlation rules, and analytics to improve visibility and reduce false positives.
Proactively hunt for threats across endpoints, networks, and cloud environments using behavioral analysis and threat intelligence.
Mentor and support SOC analysts, providing technical coaching, procedural guidance, and fostering a culture of continuous learning and operational excellence.
Collaborate with security engineering teams to improve detection capabilities and integrate new data sources and tools.
Oversee SOC processes and workflows, identifying opportunities for automation, optimization, and alignment with best practices such as MITRE ATT&CK.
Analyze and communicate security trends and incident metrics, producing actionable reports and recommendations for leadership and stakeholders.
Contribute to the development of playbooks, SOPs, and response frameworks to standardize SOC operations and improve response maturity.
Participate in red/blue/purple team exercises to validate and enhance detection and response effectiveness.
Stay ahead of emerging threats and technologies, advising on strategic improvements to the organization’s overall security posture.
Requirements
8+ years of experience in security operations, threat detection, or incident response, with at least 2–3 years in a senior or lead SOC role.
Proven track record of managing or serving as a senior escalation point for high-impact security incidents.
Deep understanding of security monitoring tools and technologies, including SIEM (e.g., Splunk, QRadar, Sentinel, Elastic), EDR/XDR, and SOAR platforms.
Strong proficiency in incident response processes, log analysis, network traffic analysis, and endpoint investigation.
Familiarity with cloud security monitoring and detection (AWS, Azure, or GCP).
Experience developing and tuning detection rules, correlation logic, and playbooks to improve SOC efficiency.
Solid understanding of network protocols, operating systems, and common attacker tools and techniques.
Demonstrated ability to lead technical teams, mentor junior analysts, and drive cross-functional collaboration.
Strong analytical, problem-solving, and decision-making skills under pressure.
Excellent written and verbal communication skills, including the ability to brief executives and non-technical stakeholders.
Experience developing SOC metrics, dashboards, and reports to track operational performance and threat trends.
Excellent communication skills, with the ability to present complex findings clearly.
Certifications (preferred): GIAC Certified Incident Handler (GCIH), GIAC Cyber Threat Intelligence (GCTI), Certified Ethical Hacker (CEH), or related certifications.
A bachelor's degree in computer science or equivalent.
Security Operations Center Analyst managing incidents and security alerts for 7 - Eleven stores. Focusing on in - depth analysis and proactive monitoring within a state - of - the - art Security Operations Center.
Security Operations Manager at Qnity managing physical security programs across global sites. Overseeing operations and collaborating with cross - functional teams to mitigate risk and maintain secure facilities.
SOC Analyst monitoring security events and responding to incidents at Junglee Games. Collaborating on security protocols to ensure protection of digital assets.
Senior Director of Global Security Operations at CyrusOne strategizing and managing security across global data centers. Driving execution, governance, and operational excellence in a high - availability environment.
Cybersecurity generalist at PwC providing security solutions and maintaining the protection of client systems. Involves monitoring security alerts, incident response, and collaboration with stakeholders.
Security Operations Manager overseeing safety measures for corporate office locations and events at Whatnot. Responsible for developing security frameworks and managing vendor relationships across global operations.
Manager overseeing technical security operations for the Protection Services department. Responsible for managing security systems, staff training, and interdepartmental collaboration.
Principal in Security Monitoring Response at Mastercard managing global crises and resilience operations. Leading incident response efforts and ensuring the safety of people and assets.
SOC Analyst II providing real time security monitoring and threat hunting services for clients in various industries. Assisting in identifying security incidents and managing vulnerabilities.