Recrute
logo

Socail Media

About the Organization

We are a global cybersecurity and digital resilience enterprise operating at the forefront of Zero Trust architecture, AI-driven threat intelligence, and mission-critical infrastructure protection. Our organization safeguards some of the world’s most complex and sensitive environments, ranging from hyperscale cloud platforms and financial systems to healthcare networks, defense ecosystems, and industrial control systems.

As cyber threats evolve in sophistication, scale, and geopolitical significance, our mission extends beyond traditional security operations. We are redefining how organizations anticipate, detect, and respond to threats in real time, leveraging advanced analytics, machine learning models, and globally distributed Security Operations Centers (SOCs).

Our SOC environment is not reactive—it is predictive, intelligence-led, and deeply integrated across enterprise and national security frameworks. We operate 24/7 across multiple regions, correlating billions of events daily, identifying advanced persistent threats (APTs), and orchestrating coordinated response strategies across cloud, endpoint, network, and identity layers.

Within this ecosystem, the Senior SOC Analyst plays a critical role. This position is designed for a seasoned cybersecurity professional who can operate at the intersection of technical depth, strategic threat analysis, and operational leadership. You will not only investigate and respond to high-severity incidents but also contribute to evolving our detection capabilities, automation strategies, and threat intelligence frameworks.

This is a high-impact role within a high-trust environment—ideal for individuals who thrive under pressure, think adversarially, and are driven to protect systems at a global scale.


Essential Duties and Responsibilities

  • Monitor, analyze, and triage security events across enterprise environments using SIEM, SOAR, EDR, and network monitoring tools

  • Lead investigation and response efforts for high-severity security incidents, including advanced persistent threats (APTs), ransomware, and insider threats

  • Perform deep-dive forensic analysis across endpoints, networks, and cloud platforms to identify root cause and attack vectors

  • Correlate threat intelligence feeds with internal telemetry to proactively identify emerging threats and vulnerabilities

  • Develop and refine detection rules, use cases, and threat hunting methodologies

  • Execute proactive threat hunting across enterprise environments, identifying anomalies and indicators of compromise (IOCs)

  • Collaborate with incident response, threat intelligence, and engineering teams to enhance security posture and response capabilities

  • Contribute to the development and optimization of SOC playbooks, automation workflows, and response procedures

  • Provide detailed incident reporting, including executive-level summaries and technical documentation

  • Mentor junior analysts and support skill development across the SOC team

  • Participate in red team/blue team exercises and continuous improvement initiatives

  • Ensure compliance with security frameworks such as NIST, ISO 27001, SOC 2, and regulatory standards relevant to client environments


Job Qualifications and Requirements

  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent experience)

  • 5–8+ years of experience in Security Operations, Incident Response, or Threat Analysis roles

  • Hands-on experience with SIEM platforms (e.g., Splunk, QRadar, Sentinel) and EDR tools (e.g., CrowdStrike, Carbon Black, Defender)

  • Strong understanding of network protocols, system architecture, and cloud environments (AWS, Azure, GCP)

  • Proven experience handling advanced threats, including APTs, malware analysis, and lateral movement detection

  • Familiarity with the MITRE ATT&CK framework and threat modeling methodologies

  • Experience with scripting or automation (Python, PowerShell, or similar) is highly preferred

  • Relevant certifications such as CISSP, GCIA, GCIH, CEH, or equivalent are strongly preferred

  • Knowledge of regulatory and compliance standards (NIST, ISO, PCI-DSS, HIPAA, etc.)


Personal Capabilities and Qualifications

  • Analytical thinker with a strong investigative mindset and attention to detail

  • Ability to remain composed and effective in high-pressure, time-sensitive situations

  • Strong problem-solving skills with a proactive and adversarial approach to security

  • Effective communicator capable of translating technical findings into actionable insights

  • Collaborative team player with the ability to work across multiple functions and time zones

  • Continuous learner with a passion for staying ahead of evolving threat landscapes

  • High level of integrity and accountability in handling sensitive information


Strategic Support

  • Contribute to the evolution of SOC capabilities, including automation, orchestration, and AI-driven detection

  • Support enterprise-wide security initiatives, including Zero Trust implementation and cloud security transformation

  • Provide input into threat intelligence strategy and long-term security architecture planning

  • Assist in evaluating and integrating new security technologies and tools

  • Partner with risk, compliance, and governance teams to ensure alignment with organizational and regulatory requirements

  • Support executive reporting on threat landscape trends, incident metrics, and security posture improvements


Working Conditions

  • Fully remote role within the United States with 24/7 SOC coverage model (shift flexibility required)

  • Rotational on-call responsibilities for high-severity incident response

  • Occasional travel for training, collaboration sessions, or security summits

  • High-intensity environment requiring rapid decision-making and continuous situational awareness

  • Access to advanced security tools, threat intelligence platforms, and global SOC infrastructure


Job Function

  • Security Operations Center (SOC)

  • Incident Detection & Response

  • Threat Intelligence & Threat Hunting

  • Cyber Defense & Risk Mitigation

  • Security Monitoring & Analysis


Compensation & Benefits

  • Compensation Package: $168,000 – $300,000 (base salary aligned with experience, technical depth, and operational impact)

  • Performance-based bonus tied to incident response effectiveness and team objectives

  • Equity participation in a rapidly growing cybersecurity leader

  • Comprehensive medical, dental, and vision coverage

  • Retirement savings plan with employer contribution

  • Flexible PTO and mental wellness support programs

  • Continuous learning budget for certifications, training, and conferences

  • Access to cutting-edge cybersecurity tools and global threat intelligence resources


Why Join Us

  • Defend critical infrastructure and enterprise systems at a global scale against advanced cyber threats

  • Work within a highly sophisticated SOC environment, leveraging AI and real-time intelligence

  • Collaborate with some of the industry’s top cybersecurity professionals and thought leaders

  • Gain exposure to complex, high-impact security challenges across multiple industries

  • Be part of an organization committed to innovation, resilience, and long-term cybersecurity leadership

Ready to Power up your Savings and Reliability?

Feel free to customize this paragraph to better reflect the specific services offered by your IT solution & the unique