About the Organization
We are a global cybersecurity and digital resilience enterprise operating at the forefront of Zero Trust architecture, AI-driven threat intelligence, and mission-critical infrastructure protection. Our organization safeguards some of the world’s most complex and sensitive environments, ranging from hyperscale cloud platforms and financial systems to healthcare networks, defense ecosystems, and industrial control systems.
As cyber threats evolve in sophistication, scale, and geopolitical significance, our mission extends beyond traditional security operations. We are redefining how organizations anticipate, detect, and respond to threats in real time, leveraging advanced analytics, machine learning models, and globally distributed Security Operations Centers (SOCs).
Our SOC environment is not reactive—it is predictive, intelligence-led, and deeply integrated across enterprise and national security frameworks. We operate 24/7 across multiple regions, correlating billions of events daily, identifying advanced persistent threats (APTs), and orchestrating coordinated response strategies across cloud, endpoint, network, and identity layers.
Within this ecosystem, the Senior SOC Analyst plays a critical role. This position is designed for a seasoned cybersecurity professional who can operate at the intersection of technical depth, strategic threat analysis, and operational leadership. You will not only investigate and respond to high-severity incidents but also contribute to evolving our detection capabilities, automation strategies, and threat intelligence frameworks.
This is a high-impact role within a high-trust environment—ideal for individuals who thrive under pressure, think adversarially, and are driven to protect systems at a global scale.
Essential Duties and Responsibilities
Monitor, analyze, and triage security events across enterprise environments using SIEM, SOAR, EDR, and network monitoring tools
Lead investigation and response efforts for high-severity security incidents, including advanced persistent threats (APTs), ransomware, and insider threats
Perform deep-dive forensic analysis across endpoints, networks, and cloud platforms to identify root cause and attack vectors
Correlate threat intelligence feeds with internal telemetry to proactively identify emerging threats and vulnerabilities
Develop and refine detection rules, use cases, and threat hunting methodologies
Execute proactive threat hunting across enterprise environments, identifying anomalies and indicators of compromise (IOCs)
Collaborate with incident response, threat intelligence, and engineering teams to enhance security posture and response capabilities
Contribute to the development and optimization of SOC playbooks, automation workflows, and response procedures
Provide detailed incident reporting, including executive-level summaries and technical documentation
Mentor junior analysts and support skill development across the SOC team
Participate in red team/blue team exercises and continuous improvement initiatives
Ensure compliance with security frameworks such as NIST, ISO 27001, SOC 2, and regulatory standards relevant to client environments
Job Qualifications and Requirements
Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent experience)
5–8+ years of experience in Security Operations, Incident Response, or Threat Analysis roles
Hands-on experience with SIEM platforms (e.g., Splunk, QRadar, Sentinel) and EDR tools (e.g., CrowdStrike, Carbon Black, Defender)
Strong understanding of network protocols, system architecture, and cloud environments (AWS, Azure, GCP)
Proven experience handling advanced threats, including APTs, malware analysis, and lateral movement detection
Familiarity with the MITRE ATT&CK framework and threat modeling methodologies
Experience with scripting or automation (Python, PowerShell, or similar) is highly preferred
Relevant certifications such as CISSP, GCIA, GCIH, CEH, or equivalent are strongly preferred
Knowledge of regulatory and compliance standards (NIST, ISO, PCI-DSS, HIPAA, etc.)
Personal Capabilities and Qualifications
Analytical thinker with a strong investigative mindset and attention to detail
Ability to remain composed and effective in high-pressure, time-sensitive situations
Strong problem-solving skills with a proactive and adversarial approach to security
Effective communicator capable of translating technical findings into actionable insights
Collaborative team player with the ability to work across multiple functions and time zones
Continuous learner with a passion for staying ahead of evolving threat landscapes
High level of integrity and accountability in handling sensitive information
Strategic Support
Contribute to the evolution of SOC capabilities, including automation, orchestration, and AI-driven detection
Support enterprise-wide security initiatives, including Zero Trust implementation and cloud security transformation
Provide input into threat intelligence strategy and long-term security architecture planning
Assist in evaluating and integrating new security technologies and tools
Partner with risk, compliance, and governance teams to ensure alignment with organizational and regulatory requirements
Support executive reporting on threat landscape trends, incident metrics, and security posture improvements
Working Conditions
Fully remote role within the United States with 24/7 SOC coverage model (shift flexibility required)
Rotational on-call responsibilities for high-severity incident response
Occasional travel for training, collaboration sessions, or security summits
High-intensity environment requiring rapid decision-making and continuous situational awareness
Access to advanced security tools, threat intelligence platforms, and global SOC infrastructure
Job Function
Security Operations Center (SOC)
Incident Detection & Response
Threat Intelligence & Threat Hunting
Cyber Defense & Risk Mitigation
Security Monitoring & Analysis
Compensation & Benefits
Compensation Package: $168,000 – $300,000 (base salary aligned with experience, technical depth, and operational impact)
Performance-based bonus tied to incident response effectiveness and team objectives
Equity participation in a rapidly growing cybersecurity leader
Comprehensive medical, dental, and vision coverage
Retirement savings plan with employer contribution
Flexible PTO and mental wellness support programs
Continuous learning budget for certifications, training, and conferences
Access to cutting-edge cybersecurity tools and global threat intelligence resources
Why Join Us
Defend critical infrastructure and enterprise systems at a global scale against advanced cyber threats
Work within a highly sophisticated SOC environment, leveraging AI and real-time intelligence
Collaborate with some of the industry’s top cybersecurity professionals and thought leaders
Gain exposure to complex, high-impact security challenges across multiple industries
Be part of an organization committed to innovation, resilience, and long-term cybersecurity leadership