CrawlJobs Logo

SecOps and SOC Analyst

assessfirst.com Logo

Assessfirst

Location Icon

Location:
United States , New York

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

120000.00 - 170000.00 USD / Year

Job Description:

Help us use technology to make a big green dent in the universe! Kraken powers some of the most innovative global developments in energy. We’re a technology company focused on creating a smart, sustainable energy system. From optimising renewable generation, creating a more intelligent grid and enabling utilities to provide excellent customer experiences, our operating system for energy is transforming the industry around the world in a way that benefits everyone. It’s a really exciting time in energy. Help us make a real impact on shaping a better, more sustainable future.

Job Responsibility:

  • Monitoring, triaging, and investigation of security incidents on Kraken’s infrastructure and Client instances
  • Responding to alerts generated by our Security Information and Event Management (SIEM) system
  • Automating and continuously expanding the detection capabilities
  • Analysing application, Cloud and access logs and events to identify potential security threats and vulnerabilities and coding this analysis for future playbooks
  • Identifying where escalation of incidents, or notification to third parties may be required
  • Providing incident response support working with our engineering and product teams where necessary
  • Maintaining, improving and automating incident response processes and playbooks, to continually improve the team's capabilities
  • Preparing reports and incident summaries, as well as reviewing and improving the content and presentation of reports produced by the team
  • Maintaining and updating security incident documentation including analysis findings and recommended mitigation strategies, automating wherever possible
  • Liaising with stakeholders in relation to incident root cause and providing remediation/improvement recommendations
  • Participation in a roster covering weekends and public holidays to deliver a 24x7 operations capability

Requirements:

  • A strong Security Operations and technology background
  • Experience in using SIEM platforms to analyse and respond to security alerts
  • Familiarity with EDR (Endpoint Detection and Response) tools and their capabilities, including host containment and evidence preservation
  • Knowledge of best practices for analysing incidents and logs in a cloud environment
  • An understanding of how different mitigation strategies can contain and respond to security events
  • An understanding of Cloud and software architectures
  • Strong analytical and problem-solving skills, with the ability to identify, triage and mitigate incidents
  • Ability to clearly communicate and document incident activities
  • A passion for security, a drive to improve security alerting and response processes by harnessing technology and automation
  • Good experience in at least some of the areas mentioned above

Nice to have:

  • Experience working in a SOC or CERT that monitors multiple client infrastructure/instances
  • Experience with AWS environments including AWS security monitoring, logging (e.g., CloudTrail, GuardDuty)
  • Relevant certifications or qualifications related to Security Operations
  • Basic scripting or automation skills using SOAR tooling to optimise tasks and develop security automation workflows
What we offer:
  • Great medical, dental, and vision insurance options including FSAs
  • Paid time off
  • 401(k) plan with employer match
  • Parental leave
  • Pre-tax commuter benefits
  • Flexible working environment
  • Equity Options
  • Modern office or co-working spaces depending on location

Additional Information:

Job Posted:
January 06, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for SecOps and SOC Analyst

Sr SOC Analyst

The Senior SOC Analyst is responsible for detection, triage, and response operat...
Location
Location
United States , West Conshohocken; Frisco
Salary
Salary:
Not provided
legendsglobal.com Logo
Legends Global
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven experience in a SOC or equivalent detection & response function
  • 3-5 years in Security Operations, Detection & Response, or Incident Handling (SOC experience required)
  • Hands-on experience with SIEM (e.g., SecOps, Sentinel, QRadar), EDR (e.g., CrowdStrike, Defender, SentinelOne), and SOAR platforms
  • Proficient in authoring detections, rule tuning, enrichment pipelines, and alert routing
  • Demonstrated capability in building and executing IR playbooks and containment/eradication plans
  • Experience conducting post-incident reviews and RCAs, and delivering corrective action plans to engineering teams
  • Scripting skills (Python/PowerShell/Bash) for automation, enrichment, and data wrangling
  • Excellent written communication for case documentation and executive-ready incident summaries
Job Responsibility
Job Responsibility
  • Build and operationalize SOC playbooks and escalation workflows
  • Lead alert triage, enrichment, and false-positive suppression
  • Author detection requirements
  • write and tune SIEM rules
  • Develop hunt hypotheses
  • lead hunt programs using advanced elemetry and signals intelligence
  • Design detection strategies across the kill chain
  • drive enterprise detection strategy
  • Execute incidents end-to-end: containment/eradication, documentation, and communication
  • Conduct post-incident reviews and drive remediation and control improvements
What we offer
What we offer
  • medical
  • dental
  • vision
  • life and disability insurance
  • paid vacation
  • 401k plan
  • Fulltime
Read More
Arrow Right

SecOps Analyst L1

To support our continued success and deliver a Fanatical Experience™ to our cust...
Location
Location
India , Gurgaon
Salary
Salary:
Not provided
rackspace.com Logo
Rackspace
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Existing experience as a Security Operations Analyst/Engineer or equivalent
  • Experience of working in large scale, public cloud environments and with using cloud native security monitoring tools
  • Experience of analysing malware and email headers
  • Skills in network security, intrusion detection and prevention systems, operating systems, risk identification and analysis, threat identification and analysis and log analysis
  • Experience of security controls
  • Knowledge of security standards (good practice) such as NIST, ISO27001, CIS, OWASP and Cloud Controls Matrix (CCM)
  • Knowledge of scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell
  • Knowledge of DevOps practices such as CI/CD, Azure DevOps, CircleCI, GitHub Actions, Ansible and/or Jenkins
  • Computer science, engineering, or information technology related degree (although not a strict requirement)
  • Holds one, or more, of the following certificates (or equivalent): CISSP, AZ500, SC-200, CPIA, CRIA, CCNIA, SSCP, CCSP, GCIH, GSOC
Job Responsibility
Job Responsibility
  • Ensure the Customer’s operational and production environment remains secure at all the times and any threats are raised and addressed in a timely manner
  • Analysis, handling, escalation of alerts from cloud-native SIEM (Security Information and Event Management) platforms
  • Carry out preliminary investigation on the event and act as per KB
  • Identification of false positives
  • Following SLA (Service Level Agreement) notification process based on alert severity
  • Creating tickets on the Customer ITSM ticketing system
  • Update runbooks, playbooks and knowledgebase documents
  • Sharing SLA details for weekly and monthly reports
  • Provide the data or details for use case creation, detection engineering or enhancements
  • Provide the data or details for the tuning of threat detections, log sources, dashboards, analytics rules and/or automations
  • Fulltime
Read More
Arrow Right

Information Security Analyst

We are looking for a Information Security Analyst to serve as a technical leader...
Location
Location
Salary
Salary:
Not provided
deel.com Logo
Deel
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in cybersecurity
  • Experience with security tools like SIEM, SOAR, EDR, SWG, DLP, CSPM, ZTNA, MDM, IdP, and others
  • Familiarity with cybersecurity frameworks and best practices, such as MITRE, NIST, CIS, and others
  • Experience collaborating with internal and external stakeholders for cyber security events/incidents
  • Have strong interpersonal and communication skills
  • Stay up to date with the latest security technologies and attack techniques
  • Experience with conducting security assessments and configuration reviews
  • Understand and have experience with at least one of the public cloud technologies (Eg AWS, GCP, Azure)
  • Ability to write query and have scripting or programming experience
  • Excellent English in both verbal and written
Job Responsibility
Job Responsibility
  • Own and lead incident response process and actively investigate events generated by security systems, observed and reported suspicious activities with precision and efficiency
  • Perform digital forensics where applicable
  • Prioritize alerts based on risk and collaborate with stakeholders for remediation
  • Administration of SIEM including data ingestion, log management, create and tune alerts to ensure relevancy, accuracy and effectiveness of detection capabilities
  • Tune detection rules to reduce "noise" and false positives to ensure high-fidelity alerts
  • Develop and maintain SOPs related to security operations
  • Build incident response playbooks to standardize workflows and drive effective remediation of security threats
  • Update detection rules to spot new Indicators of Compromise (IoCs) associated with emerging threat actors
  • Actively perform threat hunting and help setting guardrails to prevent threats
  • Design, implement, and maintain comprehensive security dashboards and generate periodic reports to track Security Operations Center (SOC) performance and key risk indicators
What we offer
What we offer
  • Stock grant opportunities dependent on your role, employment status and location
  • Additional perks and benefits based on your employment status and country
  • The flexibility of remote work, including optional WeWork access
  • Fulltime
Read More
Arrow Right

SecOps Engineer

The SecOps Engineer manages and leads the resolution of high or critical severit...
Location
Location
United States , Milwaukee; Boston; Paramus
Salary
Salary:
135000.00 - 150000.00 USD / Year
veolianorthamerica.com Logo
Veolia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s or Master’s Degree in Computer Science, Engineering, Information Security or extensive professional experience considered in place of a Bachelor’s degree
  • Min of 5 years of professional experience in SOC operations and/or incident response
  • Understanding of technologies and solutions utilized in cybersecurity and networks (SIEM, SOAR, Firewalls, IAM, IDS/IPS, End Point Protection, Threat Management/Intelligence)
  • Expertise in Cloud security such as AWS, GuardDuty, CloudTrail, Lambda, GCP, GCP Cloud Audit, Cloud Security Command Center, Log Explorer, GKE Logs, Kubernetes
  • Understanding of API security: REST, SOAP, OAuth, API Keys/Tokens, API Gateway
  • SaaS: SSPM, CASB
  • Familiarity with security frameworks, standards, and guidelines
  • Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques
  • Ability to work with complex problems where analysis of situations or data requires an in-depth evaluation of variable factors
  • Excellent troubleshooting and problem-solving skills
Job Responsibility
Job Responsibility
  • Work closely with and advise on security best practices for Cloud, Infrastructure, Developers and Data Analysts to ensure security is implemented by design
  • Design and implement technical security controls
  • Conduct security review/audit of Cloud, SaaS, Network, AI environments to identify and mitigate potential security risks
  • Develop and implement security automation workflows using scripting languages and/or automation tooling such as Torq, Tines, etc
  • Provide seniority and oversight for a SOC shift as needed
  • Conduct complex investigations and providing advice to other Security Analysts
  • Manage and lead High or Critical severity incident resolution
  • Develop customized scripts or procedures to automate the repetitive tasks and improve the efficiency of incident response activities
  • Provide expert advice on remediation and recovery efforts and develop threat remediation strategies
  • Perform proactive analysis of the attack surface and advising on potential threats and attack vectors
What we offer
What we offer
  • Paid time off policies
  • health, dental, vision, life insurance
  • savings accounts
  • tuition reimbursement
  • paid volunteering
  • employer sponsored 401(k) plan
  • Sick leave – 56 hours
  • Observed Holidays – 11 days
  • Vacation – Flexible Time Off
  • Eligible for up to 10% Annual Performance Bonus
  • Fulltime
Read More
Arrow Right

Associate Security Analyst

Tier‑1 SOC Analysts form the frontline of our organization’s cybersecurity defen...
Location
Location
United Kingdom , Manchester
Salary
Salary:
Not provided
ans.co.uk Logo
ANS Group
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Eligibility for HMG Security Clearance Candidate must be capable of achieving UK Government Security Clearance due to the nature of the role
  • Ability to work a '4 on 4 off' shift pattern, consisting of day and night shifts at our Manchester office
  • Foundational Security Knowledge Demonstrated understanding of core cybersecurity principles, either through education, training, or practical experience
  • Awareness of SOC Operations Basic familiarity with incident triage, alert handling, and escalation workflows
Job Responsibility
Job Responsibility
  • Monitor and triage alerts from Microsoft Sentinel and our SOAR platform, ensuring timely detection and prioritization of potential threats
  • Categorise alerts by severity (P1–P4) to guide appropriate response levels and ensure critical incidents are escalated quickly
  • Create and update tickets in Dynamics 365 ITSM, maintaining clear documentation of investigations, actions taken, and status changes
  • Assign tickets to the correct tier based on complexity and urgency and mark them as “In Progress” to initiate the response workflow
  • Conduct initial investigations on low to medium severity alerts analysing logs, telemetry, and reputation data to determine legitimacy
  • Close false positives and flag them for rule tuning to improve alert accuracy and reduce noise in the SOC environment
  • Initiate phone calls for P1 incidents, ensuring immediate customer communication and coordination during critical events
  • Liaise with customers during incident response, providing updates, gathering context, and ensuring transparency throughout the process
  • Maintain SLA compliance by promptly responding to alerts, especially high-priority (P1/P2) cases, to meet contractual obligations
  • Respond to SOC alerts by performing triage, containment, and documentation, escalating complex cases to Tier-2 when needed
What we offer
What we offer
  • 25 days’ holiday, plus you can buy up to 5 more days
  • birthday off
  • an extra celebration day
  • 5 days’ additional holiday in the year you get married
  • 5 volunteer days
  • Private health insurance
  • Pension contribution match and 4 x life assurance
  • Flexible working and work from anywhere for up to 30 days per year (some exceptions)
  • Maternity: 16 weeks’ full pay, Paternity: 3 weeks’ full pay, Adoption: 16 weeks’ full pay
  • Company social events
  • Fulltime
Read More
Arrow Right
New

Bus driver

Location
Location
United States , Temecula
Salary
Salary:
17.00 - 20.40 USD / Hour
atriaseniorliving.com Logo
Atria Senior Living
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • High school graduate or equivalent preferred
  • Possess a good driving record and knowledge of vehicle preventative maintenance programs
  • Must be able to provide a copy of motor vehicle driving record
  • Ability to drive the bus or other vehicles, meeting all federal and state driving regulations and requirements
  • Ability to operate the bus or other vehicles in a safe manner at all times
  • Ability to meet the needs of the Residents, transporting them to destinations on time and in an orderly manner
  • Ability to maintain the bus or other vehicles
  • Provide a copy of motor vehicle driving record to Management Team prior to employment
Job Responsibility
Job Responsibility
  • Meet all federal and state driving regulations and have valid
  • Possess an acceptable motor vehicle driving record with no major violations
  • Operate the bus or other vehicles in a safe manner at all times
  • Drive the bus or other vehicles to and from required destinations
  • Interact with residents in a caring and considerate manner regarding their transportation needs
  • Schedule destinations of the bus or other vehicles as directed by the Management Team
  • Be accessible to the Management Team during working hours
  • Keep the bus and/or other vehicles clean
  • Responsible for timely submission of paperwork related to the performance of job duties
  • Perform other duties as assigned by the Management Team
What we offer
What we offer
  • Competitive Pay
  • Paid Holidays & PTO
  • Comprehensive Health Plans
  • Career Advancement Opportunities
  • Tuition Reimbursement
  • Employee Loyalty Rewards Program
  • Retirement Savings Plan with Employer Match
  • Rewards & Recognition
  • Health & Safety
  • Parttime
Read More
Arrow Right
New

Cashier

We’re looking for a “Cashier” because “Being Awesome” isn’t a job title we can u...
Location
Location
United States , Yosemite National Park
Salary
Salary:
19.55 USD / Hour
aramark.com Logo
Aramark
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Previous customer service experience preferred
  • Previous cash handling experience preferred
  • Basic math & counting skills required
  • Must be able to work independently with limited supervision
  • Complete Food Handler and Alcohol Service trainings as required by location
Job Responsibility
Job Responsibility
  • Accurately operate a register/POS and handle cash and credit card transactions
  • Greet and assist customers while anticipating their needs
  • Count, organize and balance cash drawer, fill out the cashier slip and make deposits
  • Adheres to Aramark’s cash handling policies and procedures
  • Understand and be knowledgeable of the merchandise for sale to assist customers and accurately process transactions
  • Complete opening and closing procedures as assigned for unit based on operating hours
  • Maintain a clean and sanitary work environment during service and at the end of shift
  • Ensure product in location is stocked to appropriate levels throughout service and replenish items as needed
  • Follow all safety policies and procedures
What we offer
What we offer
  • Medical
  • Dental
  • Vision
  • Work/life resources
  • Retirement savings plans like 401(k)
  • Paid days off such as parental leave and disability coverage
  • Parttime
Read More
Arrow Right
New

Controller

This is a long-term contract position that requires a dedicated detail-oriented ...
Location
Location
United States , Miami
Salary
Salary:
Not provided
https://www.roberthalf.com Logo
Robert Half
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven experience as a Controller or similar role, with a strong background in accounting and financial management
  • Proficiency in QuickBooks is required, including implementation and troubleshooting
  • Ability to clean up and organize financial records within accounting systems
  • Excellent mentoring and training skills, with the ability to guide staff in closing procedures
  • Strong understanding of financial reporting and compliance standards
  • Exceptional organizational and problem-solving skills to handle complex tasks and transitions
  • Willingness to work 100% onsite in Miami, Florida, and participate in face-to-face interviews
Job Responsibility
Job Responsibility
  • Oversee and manage day-to-day accounting operations, ensuring accuracy and efficiency
  • Lead the implementation of QuickBooks, including setup, configuration, and training
  • Clean up and organize financial records within the existing proprietary system to ensure compliance and accuracy
  • Develop and document streamlined processes for daily accounting tasks and financial reporting
  • Train and guide staff members on month-end closing procedures to build their expertise and confidence
  • Collaborate with the team to address backlogged financial tasks and bring accounts up to date
  • Establish clear protocols for financial operations to ensure consistency and continuity
  • Provide mentorship to the accounting team, fostering detail-oriented growth and improved performance
  • Participate in face-to-face meetings and interviews to facilitate smooth onboarding and integration
  • Support the organization in achieving its financial goals while transitioning to new systems
What we offer
What we offer
  • Benefits are available including medical, vision, dental, life and disability insurance
  • Employees hired for our FTEP Program are also eligible to enroll in our company’s 401(k) or deferred compensation plan (if eligible)
  • FTEP employees also earn paid time off for vacation, personal needs, and sick time and paid holidays
  • The amount of Choice Time Off (CTO) received varies based on years of service and is pro-rated based on the hours worked per week
  • A new FTEP employee earns up to 13 days of CTO and up to 10 paid holidays per calendar year
Read More
Arrow Right