Staff SOC Analyst driving advanced threat detection and incident response for Sunrun's security team. Leading complex investigations, mentoring analysts, and improving detection capabilities in a remote setup.
Responsibilities
Serve as the senior technical expert within the SOC, providing advanced analysis, guidance, and escalation support for complex security incidents and investigations.
Lead threat detection and monitoring efforts, ensuring high-quality alerting, correlation logic, and continuous tuning of SIEM, EDR, and related security tools.
Participate in incident response operations, coordinating containment, eradication, and recovery actions across teams while maintaining situational awareness and clear communication.
Develop and enhance detection content, including use cases, correlation rules, and analytics to improve visibility and reduce false positives.
Proactively hunt for threats across endpoints, networks, and cloud environments using behavioral analysis and threat intelligence.
Mentor and support SOC analysts, providing technical coaching, procedural guidance, and fostering a culture of continuous learning and operational excellence.
Collaborate with security engineering teams to improve detection capabilities and integrate new data sources and tools.
Oversee SOC processes and workflows, identifying opportunities for automation, optimization, and alignment with best practices such as MITRE ATT&CK.
Analyze and communicate security trends and incident metrics, producing actionable reports and recommendations for leadership and stakeholders.
Contribute to the development of playbooks, SOPs, and response frameworks to standardize SOC operations and improve response maturity.
Participate in red/blue/purple team exercises to validate and enhance detection and response effectiveness.
Stay ahead of emerging threats and technologies, advising on strategic improvements to the organization’s overall security posture.
Requirements
8+ years of experience in security operations, threat detection, or incident response, with at least 2–3 years in a senior or lead SOC role.
Proven track record of managing or serving as a senior escalation point for high-impact security incidents.
Deep understanding of security monitoring tools and technologies, including SIEM (e.g., Splunk, QRadar, Sentinel, Elastic), EDR/XDR, and SOAR platforms.
Strong proficiency in incident response processes, log analysis, network traffic analysis, and endpoint investigation.
Familiarity with cloud security monitoring and detection (AWS, Azure, or GCP).
Experience developing and tuning detection rules, correlation logic, and playbooks to improve SOC efficiency.
Solid understanding of network protocols, operating systems, and common attacker tools and techniques.
Demonstrated ability to lead technical teams, mentor junior analysts, and drive cross-functional collaboration.
Strong analytical, problem-solving, and decision-making skills under pressure.
Excellent written and verbal communication skills, including the ability to brief executives and non-technical stakeholders.
Experience developing SOC metrics, dashboards, and reports to track operational performance and threat trends.
Excellent communication skills, with the ability to present complex findings clearly.
Certifications (preferred): GIAC Certified Incident Handler (GCIH), GIAC Cyber Threat Intelligence (GCTI), Certified Ethical Hacker (CEH), or related certifications.
A bachelor's degree in computer science or equivalent.
Senior Incident Response Engineer leading advanced security responses focused on Microsoft E5 security at Acrisure. Collaborating across teams for robust incident management and security policy enforcement.
Senior Director of Product Marketing coordinating go - to - market strategy for endpoint security solutions at Tanium. Leading cross - functional teams to enhance product positioning and market impact.
SecOps Engineer implementing infrastructure security solutions in AWS and GCP at Tala. Focused on vulnerability management and protection in a global financial infrastructure company.
SOC Manager leading cybersecurity operations and strategies for federal clients in a 24/7 environment. Managing SOC activities and mentoring teams while maintaining security integrity.
SOC Analyst role focusing on IT security posture monitoring and threat detection use case development for MAHLE. Collaborate with global teams to enhance security processes and tools.
Security Operations Engineer at Pexip managing and improving security monitoring systems. Leading security incidents and ensuring effective alerting and automated response.
Security Operations Engineer at Gridware enhancing security, detection, and response in cloud - first environments. Collaborating with IT and engineering teams to implement best practices.
Cybersecurity Operations Director leading cybersecurity managed services operations at a global accounting firm. Overseeing teams, driving growth, and serving as an advisor to clients.
Security Operations Analyst responsible for developing security processes and incident response. Collaborating with multiple teams for security best practices in a hybrid work environment.