CrawlJobs Logo

SecOps and SOC Analyst

assessfirst.com Logo

Assessfirst

Location Icon

Location:
United States , New York

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

120000.00 - 170000.00 USD / Year

Job Description:

Help us use technology to make a big green dent in the universe! Kraken powers some of the most innovative global developments in energy. We’re a technology company focused on creating a smart, sustainable energy system. From optimising renewable generation, creating a more intelligent grid and enabling utilities to provide excellent customer experiences, our operating system for energy is transforming the industry around the world in a way that benefits everyone. It’s a really exciting time in energy. Help us make a real impact on shaping a better, more sustainable future.

Job Responsibility:

  • Monitoring, triaging, and investigation of security incidents on Kraken’s infrastructure and Client instances
  • Responding to alerts generated by our Security Information and Event Management (SIEM) system
  • Automating and continuously expanding the detection capabilities
  • Analysing application, Cloud and access logs and events to identify potential security threats and vulnerabilities and coding this analysis for future playbooks
  • Identifying where escalation of incidents, or notification to third parties may be required
  • Providing incident response support working with our engineering and product teams where necessary
  • Maintaining, improving and automating incident response processes and playbooks, to continually improve the team's capabilities
  • Preparing reports and incident summaries, as well as reviewing and improving the content and presentation of reports produced by the team
  • Maintaining and updating security incident documentation including analysis findings and recommended mitigation strategies, automating wherever possible
  • Liaising with stakeholders in relation to incident root cause and providing remediation/improvement recommendations
  • Participation in a roster covering weekends and public holidays to deliver a 24x7 operations capability

Requirements:

  • A strong Security Operations and technology background
  • Experience in using SIEM platforms to analyse and respond to security alerts
  • Familiarity with EDR (Endpoint Detection and Response) tools and their capabilities, including host containment and evidence preservation
  • Knowledge of best practices for analysing incidents and logs in a cloud environment
  • An understanding of how different mitigation strategies can contain and respond to security events
  • An understanding of Cloud and software architectures
  • Strong analytical and problem-solving skills, with the ability to identify, triage and mitigate incidents
  • Ability to clearly communicate and document incident activities
  • A passion for security, a drive to improve security alerting and response processes by harnessing technology and automation
  • Good experience in at least some of the areas mentioned above

Nice to have:

  • Experience working in a SOC or CERT that monitors multiple client infrastructure/instances
  • Experience with AWS environments including AWS security monitoring, logging (e.g., CloudTrail, GuardDuty)
  • Relevant certifications or qualifications related to Security Operations
  • Basic scripting or automation skills using SOAR tooling to optimise tasks and develop security automation workflows
What we offer:
  • Great medical, dental, and vision insurance options including FSAs
  • Paid time off
  • 401(k) plan with employer match
  • Parental leave
  • Pre-tax commuter benefits
  • Flexible working environment
  • Equity Options
  • Modern office or co-working spaces depending on location

Additional Information:

Job Posted:
January 06, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for SecOps and SOC Analyst

Sr SecOps Engineer/ Consultant

The Senior Security Operations (SecOps) Engineer is a hands-on technical leader ...
Location
Location
United States , Houston
Salary
Salary:
Not provided
bhsg.com Logo
Beacon Hill
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Deep experience with SIEM tools (preferably Microsoft Sentinel)
  • strong incident response expertise
  • solid understanding of OT/ICS security
Job Responsibility
Job Responsibility
  • Advanced threat detection
  • incident response
  • security operations across both IT and OT (including SCADA) environments
  • serving as a key escalation point for complex incidents
  • leading investigations involving network, endpoint, identity, and cloud threats
  • partnering closely with engineering, infrastructure, and compliance teams
  • improving SOC processes
  • tuning detections
  • mentoring junior analysts
  • strengthening overall security posture
  • Fulltime
Read More
Arrow Right

SecOps Analyst L1

To support our continued success and deliver a Fanatical Experience™ to our cust...
Location
Location
India , Gurgaon
Salary
Salary:
Not provided
rackspace.com Logo
Rackspace
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Existing experience as a Security Operations Analyst/Engineer or equivalent
  • Experience of working in large scale, public cloud environments and with using cloud native security monitoring tools
  • Experience of analysing malware and email headers
  • Skills in network security, intrusion detection and prevention systems, operating systems, risk identification and analysis, threat identification and analysis and log analysis
  • Experience of security controls
  • Knowledge of security standards (good practice) such as NIST, ISO27001, CIS, OWASP and Cloud Controls Matrix (CCM)
  • Knowledge of scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell
  • Knowledge of DevOps practices such as CI/CD, Azure DevOps, CircleCI, GitHub Actions, Ansible and/or Jenkins
  • Computer science, engineering, or information technology related degree (although not a strict requirement)
  • Holds one, or more, of the following certificates (or equivalent): CISSP, AZ500, SC-200, CPIA, CRIA, CCNIA, SSCP, CCSP, GCIH, GSOC
Job Responsibility
Job Responsibility
  • Ensure the Customer’s operational and production environment remains secure at all the times and any threats are raised and addressed in a timely manner
  • Analysis, handling, escalation of alerts from cloud-native SIEM (Security Information and Event Management) platforms
  • Carry out preliminary investigation on the event and act as per KB
  • Identification of false positives
  • Following SLA (Service Level Agreement) notification process based on alert severity
  • Creating tickets on the Customer ITSM ticketing system
  • Update runbooks, playbooks and knowledgebase documents
  • Sharing SLA details for weekly and monthly reports
  • Provide the data or details for use case creation, detection engineering or enhancements
  • Provide the data or details for the tuning of threat detections, log sources, dashboards, analytics rules and/or automations
  • Fulltime
Read More
Arrow Right

Information Security Analyst

We are looking for a Information Security Analyst to serve as a technical leader...
Location
Location
Salary
Salary:
Not provided
deel.com Logo
Deel
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in cybersecurity
  • Experience with security tools like SIEM, SOAR, EDR, SWG, DLP, CSPM, ZTNA, MDM, IdP, and others
  • Familiarity with cybersecurity frameworks and best practices, such as MITRE, NIST, CIS, and others
  • Experience collaborating with internal and external stakeholders for cyber security events/incidents
  • Have strong interpersonal and communication skills
  • Stay up to date with the latest security technologies and attack techniques
  • Experience with conducting security assessments and configuration reviews
  • Understand and have experience with at least one of the public cloud technologies (Eg AWS, GCP, Azure)
  • Ability to write query and have scripting or programming experience
  • Excellent English in both verbal and written
Job Responsibility
Job Responsibility
  • Own and lead incident response process and actively investigate events generated by security systems, observed and reported suspicious activities with precision and efficiency
  • Perform digital forensics where applicable
  • Prioritize alerts based on risk and collaborate with stakeholders for remediation
  • Administration of SIEM including data ingestion, log management, create and tune alerts to ensure relevancy, accuracy and effectiveness of detection capabilities
  • Tune detection rules to reduce "noise" and false positives to ensure high-fidelity alerts
  • Develop and maintain SOPs related to security operations
  • Build incident response playbooks to standardize workflows and drive effective remediation of security threats
  • Update detection rules to spot new Indicators of Compromise (IoCs) associated with emerging threat actors
  • Actively perform threat hunting and help setting guardrails to prevent threats
  • Design, implement, and maintain comprehensive security dashboards and generate periodic reports to track Security Operations Center (SOC) performance and key risk indicators
What we offer
What we offer
  • Stock grant opportunities dependent on your role, employment status and location
  • Additional perks and benefits based on your employment status and country
  • The flexibility of remote work, including optional WeWork access
  • Fulltime
Read More
Arrow Right

SecOps Engineer

The SecOps Engineer manages and leads the resolution of high or critical severit...
Location
Location
United States , Milwaukee; Boston; Paramus
Salary
Salary:
135000.00 - 150000.00 USD / Year
veolianorthamerica.com Logo
Veolia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s or Master’s Degree in Computer Science, Engineering, Information Security or extensive professional experience considered in place of a Bachelor’s degree
  • Min of 5 years of professional experience in SOC operations and/or incident response
  • Understanding of technologies and solutions utilized in cybersecurity and networks (SIEM, SOAR, Firewalls, IAM, IDS/IPS, End Point Protection, Threat Management/Intelligence)
  • Expertise in Cloud security such as AWS, GuardDuty, CloudTrail, Lambda, GCP, GCP Cloud Audit, Cloud Security Command Center, Log Explorer, GKE Logs, Kubernetes
  • Understanding of API security: REST, SOAP, OAuth, API Keys/Tokens, API Gateway
  • SaaS: SSPM, CASB
  • Familiarity with security frameworks, standards, and guidelines
  • Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques
  • Ability to work with complex problems where analysis of situations or data requires an in-depth evaluation of variable factors
  • Excellent troubleshooting and problem-solving skills
Job Responsibility
Job Responsibility
  • Work closely with and advise on security best practices for Cloud, Infrastructure, Developers and Data Analysts to ensure security is implemented by design
  • Design and implement technical security controls
  • Conduct security review/audit of Cloud, SaaS, Network, AI environments to identify and mitigate potential security risks
  • Develop and implement security automation workflows using scripting languages and/or automation tooling such as Torq, Tines, etc
  • Provide seniority and oversight for a SOC shift as needed
  • Conduct complex investigations and providing advice to other Security Analysts
  • Manage and lead High or Critical severity incident resolution
  • Develop customized scripts or procedures to automate the repetitive tasks and improve the efficiency of incident response activities
  • Provide expert advice on remediation and recovery efforts and develop threat remediation strategies
  • Perform proactive analysis of the attack surface and advising on potential threats and attack vectors
What we offer
What we offer
  • Paid time off policies
  • health, dental, vision, life insurance
  • savings accounts
  • tuition reimbursement
  • paid volunteering
  • employer sponsored 401(k) plan
  • Sick leave – 56 hours
  • Observed Holidays – 11 days
  • Vacation – Flexible Time Off
  • Eligible for up to 10% Annual Performance Bonus
  • Fulltime
Read More
Arrow Right

Associate Security Analyst

Tier‑1 SOC Analysts form the frontline of our organization’s cybersecurity defen...
Location
Location
United Kingdom , Manchester
Salary
Salary:
Not provided
ans.co.uk Logo
ANS Group
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Eligibility for HMG Security Clearance Candidate must be capable of achieving UK Government Security Clearance due to the nature of the role
  • Ability to work a '4 on 4 off' shift pattern, consisting of day and night shifts at our Manchester office
  • Foundational Security Knowledge Demonstrated understanding of core cybersecurity principles, either through education, training, or practical experience
  • Awareness of SOC Operations Basic familiarity with incident triage, alert handling, and escalation workflows
Job Responsibility
Job Responsibility
  • Monitor and triage alerts from Microsoft Sentinel and our SOAR platform, ensuring timely detection and prioritization of potential threats
  • Categorise alerts by severity (P1–P4) to guide appropriate response levels and ensure critical incidents are escalated quickly
  • Create and update tickets in Dynamics 365 ITSM, maintaining clear documentation of investigations, actions taken, and status changes
  • Assign tickets to the correct tier based on complexity and urgency and mark them as “In Progress” to initiate the response workflow
  • Conduct initial investigations on low to medium severity alerts analysing logs, telemetry, and reputation data to determine legitimacy
  • Close false positives and flag them for rule tuning to improve alert accuracy and reduce noise in the SOC environment
  • Initiate phone calls for P1 incidents, ensuring immediate customer communication and coordination during critical events
  • Liaise with customers during incident response, providing updates, gathering context, and ensuring transparency throughout the process
  • Maintain SLA compliance by promptly responding to alerts, especially high-priority (P1/P2) cases, to meet contractual obligations
  • Respond to SOC alerts by performing triage, containment, and documentation, escalating complex cases to Tier-2 when needed
What we offer
What we offer
  • 25 days’ holiday, plus you can buy up to 5 more days
  • birthday off
  • an extra celebration day
  • 5 days’ additional holiday in the year you get married
  • 5 volunteer days
  • Private health insurance
  • Pension contribution match and 4 x life assurance
  • Flexible working and work from anywhere for up to 30 days per year (some exceptions)
  • Maternity: 16 weeks’ full pay, Paternity: 3 weeks’ full pay, Adoption: 16 weeks’ full pay
  • Company social events
  • Fulltime
Read More
Arrow Right

Cybersecurity Analyst

Join NTT DATA Romania as a Cybersecurity Analyst, where you will monitor and ana...
Location
Location
Romania , Sibiu; Cluj-Napoca; Bucharest
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Master’s or bachelor’s degree in related fields, preferably Cybersecurity, Computer Science or Engineering
  • Minimum 5 years of relevant experience in Cybersecurity
  • Proven track record of security activities, like investigations, incident response or forensics
  • Skills in usage of EDR, XDR, SIEM and SOAR tools
  • Skills with any of the following tools are advantageous: Elasticsearch, Google SecOps, Splunk, Carbon Black, Crowdstrike Falcon, MS Defender, MS Sentinel, ServiceNow.
  • CompTIA, SANS, CCNA or similar certifications represent a big plus
  • Customer oriented behavior
  • Fluent English verbally and in writing
Job Responsibility
Job Responsibility
  • Monitor, triage and analyze security alerts in customer specific SIEM, EDR and other security tools
  • Perform Incident Response, define remediation and mitigation recommendations to customers
  • Evaluate emerging cybersecurity threats and ways to manage them.
  • Perform Threat Hunting via SIEM/EDR/XDR and other security systems and logs
  • Create Incident reports and showcase them to customers
  • Contribute to service improvements
  • Participate in customer meetings, maintain close relationship with current clients and understand the client’s security service needs, wants and pain points
  • Act under 24/7 coverage: Business Hours + On-Call
  • Assist in troubleshooting logging issues
  • Continuously improve your technical and professional skills
What we offer
What we offer
  • Smooth integration and a supportive mentor
  • Pick your working style: choose from Remote, Hybrid or Office work opportunities
  • Projects have different working hours to suit your needs
  • Sponsored certifications, trainings and top e-learning platforms
  • Private Health Insurance
  • Individual coaching sessions or accredited Coaching School
  • Epic parties or themed events
Read More
Arrow Right

Receptionist

We are looking for a detail-oriented Receptionist to join our team in Miami, Flo...
Location
Location
United States , Miami
Salary
Salary:
Not provided
https://www.roberthalf.com Logo
Robert Half
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proficiency in using a multi-line phone system for managing calls
  • Strong customer service skills with the ability to handle inquiries professionally
  • Experience in data entry with attention to detail and accuracy
  • Ability to communicate effectively through email correspondence
  • Excellent interpersonal skills to interact with staff and visitors
  • Competence in Microsoft Excel, Outlook, and Word for administrative tasks
  • Organizational skills to manage files and maintain office order
  • Capability to schedule appointments and coordinate meetings efficiently
Job Responsibility
Job Responsibility
  • Oversee access to the office, ensuring security and proper protocols are followed
  • Manage the stocking and organization of supplies in the kitchens to maintain efficiency
  • Maintain the cleanliness and orderliness of the office environment to ensure a neat appearance
  • Handle incoming phone calls using a multi-line phone system, providing courteous and efficient service
  • Assist with scheduling appointments and coordinating meetings as needed
  • Perform accurate data entry tasks to support administrative functions
  • Organize and maintain files, ensuring easy accessibility and proper documentation
  • Communicate effectively via email to address inquiries and provide information
  • Execute various ad hoc projects and tasks as assigned to support office operations
What we offer
What we offer
  • medical, vision, dental, and life and disability insurance
  • eligible to enroll in our company 401(k) plan
Read More
Arrow Right

Psychiatrist

Astrya Global, a San Diego–based medical staffing agency, is hiring Psychiatrist...
Location
Location
United States , San Bernardino
Salary
Salary:
Not provided
astryaglobal.com Logo
Astrya Global
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active CA licensure
  • Board certification
  • Active CA DEA
  • New graduates eligible
Job Responsibility
Job Responsibility
  • Evaluate and diagnose mental health disorders
  • Develop and implement treatment plans
  • See 15+ patients per day completing initial and follow up appointments
  • Prescribe and refill medications
  • Collaborate with up to 4 NPs as needed
What we offer
What we offer
  • Malpractice Insurance
  • Weekly pay
  • Full-service credentialing and licensing department
  • Dedicated corporate travel team with airfare, car rental and hotel booking
  • Referral Bonus up to $5,000
  • Fulltime
Read More
Arrow Right