Senior Security Analyst - REMOTE
Objective Paradigm
Anywhere, TX, US
Remote
Full-time
As a Senior SOC Analyst, you won't be confined to triaging alerts; instead, every team member actively contributes to building and advancing our approach to security operations.
The work is dynamic and engaging, from developing innovative detections and playbooks to participating in incident response.
If you're passionate about cybersecurity, ready for varied challenges, and eager to contribute to a collaborative and forward-thinking team, join us and help find and stop threats.
Responsibilities
- Lead and manage complex incident response engagements, ensuring effective coordination and communication across technical teams and stakeholders.
- Design, mature, and implement advanced playbooks for triage, investigation, and response to cyber threats, with a focus on continuous improvement and automation.
- Serve as a senior escalation point for challenging incidents, providing expert guidance and decision-making support to junior analysts and the broader SOC team.
- Spearhead initiatives to enhance our incident response processes, leveraging the latest methodologies and technologies to increase efficiency and effectiveness.
- Communicate complex security incidents and recommendations to customers and stakeholders, translating technical details into actionable intelligence.
- Oversee the implementation and tuning of threat signatures, ensuring optimal performance and detection capabilities.
- Lead, mentor, and develop junior analysts, fostering a culture of continuous learning and professional growth within the team.
- Organize and direct SOC training programs, emphasizing advanced skills and readiness for incident response challenges.
Skills
- Proven leadership and team management abilities.
- Advanced knowledge and hands-on experience in incident response and cybersecurity operations.
- Exceptional critical thinking, analytical skills, and attention to detail.
- Excellent written and oral communication skills, with the ability to convey complex information clearly and persuasively.
- Strong interpersonal and teamwork skills, with a demonstrated ability to collaborate effectively across diverse teams.
- Strong understanding of Windows event logs and other investigation relevant artifacts
- Experience performing Digital Forensics a plus Requirements
- 2-5 years experience in Security Operations or similar role
- Experience with log management, SIEM, and endpoint protection
- On-call availability (Some nights, weekends, and holidays) Competitive Applicants Will Have
- Experience in a managed services role
- Experience as an incident responder
- Threat hunting experience
- Experience with tools and technologies such as SOAR, Sigma, Sysmon, Thinkst, and OpenSearch / Elastic
- Working knowledge of industry best practices such as HIPAA, PCI-DSS, and NIST
- Experience working with email platforms such as O365, Google Workspace, and Exchange
LI-JC2
22 days ago