Staff SOC Analyst driving advanced threat detection and incident response for Sunrun's security team. Leading complex investigations, mentoring analysts, and improving detection capabilities in a remote setup.
Responsibilities
Serve as the senior technical expert within the SOC, providing advanced analysis, guidance, and escalation support for complex security incidents and investigations.
Lead threat detection and monitoring efforts, ensuring high-quality alerting, correlation logic, and continuous tuning of SIEM, EDR, and related security tools.
Participate in incident response operations, coordinating containment, eradication, and recovery actions across teams while maintaining situational awareness and clear communication.
Develop and enhance detection content, including use cases, correlation rules, and analytics to improve visibility and reduce false positives.
Proactively hunt for threats across endpoints, networks, and cloud environments using behavioral analysis and threat intelligence.
Mentor and support SOC analysts, providing technical coaching, procedural guidance, and fostering a culture of continuous learning and operational excellence.
Collaborate with security engineering teams to improve detection capabilities and integrate new data sources and tools.
Oversee SOC processes and workflows, identifying opportunities for automation, optimization, and alignment with best practices such as MITRE ATT&CK.
Analyze and communicate security trends and incident metrics, producing actionable reports and recommendations for leadership and stakeholders.
Contribute to the development of playbooks, SOPs, and response frameworks to standardize SOC operations and improve response maturity.
Participate in red/blue/purple team exercises to validate and enhance detection and response effectiveness.
Stay ahead of emerging threats and technologies, advising on strategic improvements to the organization’s overall security posture.
Requirements
8+ years of experience in security operations, threat detection, or incident response, with at least 2–3 years in a senior or lead SOC role.
Proven track record of managing or serving as a senior escalation point for high-impact security incidents.
Deep understanding of security monitoring tools and technologies, including SIEM (e.g., Splunk, QRadar, Sentinel, Elastic), EDR/XDR, and SOAR platforms.
Strong proficiency in incident response processes, log analysis, network traffic analysis, and endpoint investigation.
Familiarity with cloud security monitoring and detection (AWS, Azure, or GCP).
Experience developing and tuning detection rules, correlation logic, and playbooks to improve SOC efficiency.
Solid understanding of network protocols, operating systems, and common attacker tools and techniques.
Demonstrated ability to lead technical teams, mentor junior analysts, and drive cross-functional collaboration.
Strong analytical, problem-solving, and decision-making skills under pressure.
Excellent written and verbal communication skills, including the ability to brief executives and non-technical stakeholders.
Experience developing SOC metrics, dashboards, and reports to track operational performance and threat trends.
Excellent communication skills, with the ability to present complex findings clearly.
Certifications (preferred): GIAC Certified Incident Handler (GCIH), GIAC Cyber Threat Intelligence (GCTI), Certified Ethical Hacker (CEH), or related certifications.
A bachelor's degree in computer science or equivalent.
Director of Security Operations overseeing incident response tasks at Gartner. Leading a geographically dispersed team and improving capabilities for detecting and responding to threats.
Senior Manager for Product Security Ops & Strategy at Salesforce overseeing strategic initiatives and ensuring alignment with security goals. Driving operational excellence and executive communication across teams.
Security Operations Manager responsible for planning and managing security programs at Cox Enterprises. Collaborating with stakeholders and analyzing security vulnerabilities while conducting investigations.
Security Operations Centre Analyst for Paysafe, responding to real - time security alerts and assisting Incident Response in security events. Requires collaboration in a global team environment with various security frameworks.
SOC Analyst focusing on real - time security monitoring and incident response for Atos Group in Bengaluru, ensuring proactive threat detection and effective response to incidents.
Manage global corporate security operations programs at OpenAI, collaborating across teams to enhance security measures. Focus on operational standards and program development for effective security initiatives.
Senior SOC Analyst leading advanced security monitoring and response across various platforms. Collaborating with teams to strengthen security posture and mentor junior analysts.
SOC Analyst developing cybersecurity solutions at Capgemini for leading organizations. Engaging in incident response and security operations in a collaborative environment with global colleagues.
Security Operations Engineer focused on secure coding practices and incident response at LUZA Group. Collaborating with security, engineering, and DevOps teams to reinforce organizational security posture.