Hybrid Staff SOC Analyst

Posted 2 days ago

Apply now

About the role

  • Serve as the senior technical expert within the SOC, providing advanced analysis, guidance, and escalation support for complex security incidents and investigations.
  • Lead threat detection and monitoring efforts, ensuring high-quality alerting, correlation logic, and continuous tuning of SIEM, EDR, and related security tools.
  • Participate in incident response operations, coordinating containment, eradication, and recovery actions across teams while maintaining situational awareness and clear communication.
  • Develop and enhance detection content, including use cases, correlation rules, and analytics to improve visibility and reduce false positives.
  • Proactively hunt for threats across endpoints, networks, and cloud environments using behavioral analysis and threat intelligence.
  • Mentor and support SOC analysts, providing technical coaching, procedural guidance, and fostering a culture of continuous learning and operational excellence.
  • Collaborate with security engineering teams to improve detection capabilities and integrate new data sources and tools.
  • Oversee SOC processes and workflows, identifying opportunities for automation, optimization, and alignment with best practices such as MITRE ATT&CK.
  • Analyze and communicate security trends and incident metrics, producing actionable reports and recommendations for leadership and stakeholders.
  • Contribute to the development of playbooks, SOPs, and response frameworks to standardize SOC operations and improve response maturity.
  • Participate in red/blue/purple team exercises to validate and enhance detection and response effectiveness.
  • Stay ahead of emerging threats and technologies, advising on strategic improvements to the organization’s overall security posture.

Requirements

  • 8+ years of experience in security operations, threat detection, or incident response, with at least 2–3 years in a senior or lead SOC role.
  • Proven track record of managing or serving as a senior escalation point for high-impact security incidents.
  • Deep understanding of security monitoring tools and technologies, including SIEM (e.g., Splunk, QRadar, Sentinel, Elastic), EDR/XDR, and SOAR platforms.
  • Strong proficiency in incident response processes, log analysis, network traffic analysis, and endpoint investigation.
  • Familiarity with cloud security monitoring and detection (AWS, Azure, or GCP).
  • Experience developing and tuning detection rules, correlation logic, and playbooks to improve SOC efficiency.
  • Solid understanding of network protocols, operating systems, and common attacker tools and techniques.
  • Demonstrated ability to lead technical teams, mentor junior analysts, and drive cross-functional collaboration.
  • Strong analytical, problem-solving, and decision-making skills under pressure.
  • Excellent written and verbal communication skills, including the ability to brief executives and non-technical stakeholders.
  • Experience developing SOC metrics, dashboards, and reports to track operational performance and threat trends.
  • Excellent communication skills, with the ability to present complex findings clearly.
  • Certifications (preferred): GIAC Certified Incident Handler (GCIH), GIAC Cyber Threat Intelligence (GCTI), Certified Ethical Hacker (CEH), or related certifications.
  • A bachelor's degree in computer science or equivalent.

Benefits

  • Medical/Dental/Vision Insurance
  • Life Insurance
  • Disability Insurance
  • 401k Plan + Company Match
  • Stock Purchase Plan
  • Paid Vacations/Holidays
  • Paid Baby Bonding Leave
  • Employee Discounts
  • PowerU - 100% Funded Education Programs
  • Employee Donation Matching
  • Volunteer Hour Rewards

Job title

Staff SOC Analyst

Job type

Experience level

Lead

Salary

$150,290 - $180,348 per year

Degree requirement

Bachelor's Degree

Location requirements

Report this job

See something inaccurate? Let us know and we'll update the listing.

Report job