We are seeking a seasoned Level 3 SOC Analyst to play a critical role in leading incident response efforts, supporting the development and maturity of SOC operations, and mentoring junior analysts. As a key member of our Digital Security Group, you will be responsible for advanced threat detection, triage, remediation, and continuous improvement of incident response capabilities and processes.
Key Responsibilities:
- Act as the escalation point for complex security incidents from L1/L2 SOC Analysts, assessing potential business risk and initiating appropriate response strategies.
- Conduct in-depth log analysis across various data sources to uncover Tactics, Techniques, and Procedures (TTPs), malware behavior, and threat actor activity.
- Coordinate closely with SIEM engineers to enhance detection logic, event correlation, alert accuracy, and system performance.
- Develop, refine, and maintain incident response playbooks, recommending automation and efficiency improvements based on incident trends and analysis.
- Lead root cause investigations and participate in post-incident reviews, documenting findings and driving lessons learned.
- Support and guide improvement initiatives within the SOC, including documentation, incident trend analysis, and operational maturity assessments.
- Stay informed of emerging threats, attack vectors, and security technologies, particularly in cloud security and SaaS environments.
- Leverage frameworks such as MITRE ATT&CK and SANS to assess and track threat activity and detection coverage.
- Serve as a subject matter expert (SME), mentoring L1/L2 SOC team members, providing technical guidance, and acting as a resource for escalated incidents.
- Lead coordination of complex incident response engagements and client onboarding projects to ensure a smooth transition into the SOC environment.
Qualifications:
- 5–7 years of hands-on experience in cybersecurity operations, including roles in a SOC, incident response, or cyber threat analysis.
- Relevant security certifications are required, such as CISSP, CISM, GIAC, CompTIA CySA+/Security+, CISA, or SANS certifications.
- Strong expertise in Microsoft Sentinel or other SIEM/SOAR platforms, including experience in writing queries, tuning alerts, and conducting log analytics.
- Experience with Microsoft Defender Endpoint, CSPM/CWP, or similar endpoint/cloud security technologies, with the ability to recommend mitigations based on threat intelligence.
- Proficiency in malware analysis, both static and dynamic, and understanding of threat actor techniques.
- Strong communication skills with the ability to clearly present technical findings, incident summaries, and recommendations to both technical and non-technical stakeholders.
- Proven experience managing or contributing to complex security projects, process improvement initiatives, or business development efforts (e.g., proposals, client engagements).
- Strong understanding of enterprise security controls, including asset lifecycle management, vulnerability/patch management, endpoint security, and architecture review.
- Familiarity with cloud transformation initiatives, cloud security operations, and architectural best practices for platforms like Azure, AWS, or Google Cloud.
- Demonstrated leadership capabilities, including mentoring, training, and guiding junior analysts in technical and procedural aspects.
Nice to Have:
- Hands-on experience with multi-cloud security (Azure, AWS, GCP).
- Previous experience in reverse engineering and threat hunting.
- Familiarity with automation tools and scripting (PowerShell, Python, etc.).
We’re an equal opportunity employer committed to increasing diversity and inclusion in today’s workforce. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. Minorities, women, LGBTQ candidates, and individuals with disabilities are encouraged to apply. If you require an accommodation, please review our
accessibility policy and reach out to our accessibility officer with any questions.