CrawlJobs Logo

Senior Analyst, Security Operations Center

brightspeed.com Logo

Brightspeed

Location Icon

Location:
United States , Charlotte

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Senior Analyst, Security Operations Center (SOC) is a technical leader responsible for advanced threat detection, incident response, and continuous improvement of Brightspeed’s enterprise security monitoring capabilities. Operating in a 24x7 environment, this role leads complex investigations, coordinates multi-team response efforts, and develops advanced detection and automation capabilities. The Senior Analyst mentors junior analysts, contributes to SOC strategy and roadmap development, and plays a key role in strengthening Brightspeed’s security posture through proactive threat hunting, refined detection logic, and operational excellence.

Job Responsibility:

  • Lead incident response efforts for high-severity and complex security events, serving as the primary technical coordinator during major incidents
  • Act as escalation point for junior analysts, providing technical guidance and decision support in real time
  • Oversee daily SOC operations, including shift management, workload distribution, and quality assurance of investigations
  • Conduct post-incident reviews and facilitate lessons-learned sessions to drive continuous improvement
  • Mentor and train junior analysts to elevate team capabilities and strengthen overall SOC maturity
  • Perform advanced threat analysis, including APT detection, multi-stage attack correlation, and deep analysis of threat actor tactics, techniques, and procedures (TTPs)
  • Lead proactive threat hunting initiatives across cloud, network, identity, and endpoint environments
  • Design and implement advanced detection rules, correlation logic, queries, and dashboards in SIEM and SOAR platforms
  • Develop custom automation playbooks to accelerate investigation, triage, and containment processes
  • Evaluate and recommend enhanced SOC technologies, detection techniques, and analytic capabilities
  • Lead continuous improvement initiatives for SOC processes, workflow automation, detection coverage, and operational efficiency
  • Develop SOC documentation including advanced runbooks, SOPs, and knowledge base articles
  • Contribute to SOC strategic planning, metrics, KPIs, and roadmap initiatives aligned with Security leadership
  • Support transformational projects such as AI-driven detection, automation frameworks, and maturing detection-as-code practices
  • Collaborate closely with Threat Intelligence, Engineering, IT, and Network teams to align detection and response capabilities with enterprise risk priorities
  • Monitor, triage, and analyze security alerts from SIEM, SOAR, EDR/XDR, DLP, CASB, and cloud security tools
  • Provide prescriptive remediation guidance across IT and Network operations teams
  • Document investigations, root cause analyses, and recommendations for prevention and long-term mitigation
  • Participate in a 24x7 on-call rotation, including night shifts as required, for escalated incidents

Requirements:

  • Associate's degree in Computer Science, Information Systems, Engineering, Technology, or related field or equivalent experience/training
  • Experience managing cases/incidents
  • Ability to think analytically
  • Robust creativity and problem-solving skills
  • Knowledge of technical systems and terminology
  • Proficiency in threat management analysis and dissemination
  • Proficiency in scripting languages
  • Advanced written and verbal communication skills

Nice to have:

  • Bachelor's Degree in Computer Science, Information Systems, Engineering, Technology, or related field or equivalent experience/training
  • Information Security Certification (GSEC, Security+, GIAC)
  • Python or PowerShell scripting
  • Azure Sentinel and CrowdStrike experience
  • A solid understanding of networking, cyber security concepts
  • Aptitude in solving problems independently
  • Demonstrated problem-solving skills
  • Sound decision-making ability
  • Must be detail oriented, well organized, thrive in a sense-of-urgency environment, leverage best practices, and most importantly, innovate through any problem with a can-do attitude
  • Strong analytical and time management skills
What we offer:
  • Competitive compensation
  • Comprehensive benefits
  • Medical, dental, vision, and life insurance
  • Employee assistance program
  • 401K plan with company match
  • Voluntary benefits

Additional Information:

Job Posted:
January 05, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Senior Analyst, Security Operations Center

Senior Cybersecurity Analyst, Threat Hunter

Our cybersecurity and information security teams at IDEXX contribute to a more r...
Location
Location
United States , Westbrook, Maine
Salary
Salary:
120000.00 - 140000.00 USD / Year
idexx.com Logo
IDEXX
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6–10 years of experience in cybersecurity roles
  • Minimum of 3 years dedicated specifically to threat hunting or advanced incident response
  • Bachelor’s degree in computer science, Cybersecurity, Information Technology, or a related field
  • Preferred certifications GCIH (GIAC Certified Incident Handler) and CompTIA CySA+ (Cybersecurity Analyst+) certification
  • Proven, hands-on experience using platform for EDR (Endpoint Detection and Response) and threat hunting
  • Expert-level knowledge of PowerShell Scripting, Python and EDR and SIEM query language is preferred
  • Deep understanding of incident response lifecycles, methodologies, and forensic techniques
  • Strong knowledge of networking protocols, operating systems (Windows, Linux, macOS), and common attack vectors
  • Familiarity with scripting languages (e.g., Python, PowerShell) for automation of hunting tasks is a plus
  • Exceptional analytical and problem-solving skills with keen attention to detail
Job Responsibility
Job Responsibility
  • Proactively hunt for indicators of compromise (IOCs) and advanced persistent threats (APTs) across the network, endpoints, and cloud environments using threat intelligence and a hypothesis-driven methodology
  • Conduct in-depth analysis of security events, network traffic, and endpoint data to identify malicious activity and potential breaches
  • Utilize the SIEM and EDR platform extensively, applying expert knowledge of the scripting, SIEM and EDR query language to perform complex searches and data analysis
  • Lead and participate in incident response activities, including containment, eradication, and recovery efforts, serving as a primary escalation point for critical security incidents
  • Develop and refine threat hunting playbooks, procedures, and detection rules to improve the security team’s efficiency and effectiveness
  • Collaborate with the security engineering and security operations center (SOC) teams to integrate new threat intelligence and enhance existing security tools and controls
  • Mentor junior analysts and contribute to the ongoing improvement of the organization's overall security posture
What we offer
What we offer
  • Opportunity for annual cash bonus
  • Health / Dental / Vision Benefits Day-One
  • 5% matching 401k
  • Additional benefits including but not limited to financial support, pet insurance, mental health resources, volunteer paid days off, employee stock program, foundation donation matching
  • Fulltime
Read More
Arrow Right

Director of Physical Security & Compliance

Crusoe is expanding our hyper-scale AI and high-performance computing (HPC) data...
Location
Location
United States , San Francisco
Salary
Salary:
225000.00 - 280000.00 USD / Year
crusoe.ai Logo
Crusoe
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10+ years in physical security or mission-critical infrastructure
  • Deep knowledge of operating physical security technologies and system design
  • Experience with in a high-availability environment
  • Experience implementing controls for SOC 2, ISO, NIST, and similar frameworks
  • Proven ability to manage multi-site security operations and compliance programs
  • Strong incident management and risk assessment background
  • Experience designing or scaling enterprise security systems across multi-site environments
  • Strong understanding of SOC 2, ISO 27001, NIST, and related frameworks
  • Background managing guard operations, access control, and incident response
  • Ability to lead programs from zero-to-one and influence senior stakeholders
Job Responsibility
Job Responsibility
  • Operationalize the global physical security strategy, and ensure data center alignment with enterprise security standards, and policies
  • Implement the security risk framework within Data Center Facility Operations
  • Translate enterprise security requirements into site-specific designs for new campuses
  • Conduct site-level security risk and threat assessments
  • Establish a scalable security operations model for 50–400 MW hyper-scale facilities
  • Own the operational lifecycle of dedicated physical security systems (ACS, VSS, IDS)
  • Execute site-level operational controls to ensure adherence to compliance programs for SOC 2, ISO 27001/27002, NIST 800-53, and other regulations
  • Maintain operational documentation, logs, and evidence of adherence to established internal controls
  • Maintain year-round audit readiness for physical access to cages, racks, and on-site office rooms
  • Ensure operational availability, resiliency, and scalability of security infrastructure
What we offer
What we offer
  • Restricted Stock Units in a fast growing, well-funded technology company
  • Health insurance package options that include HDHP and PPO, vision, and dental for you and your dependents
  • Employer contributions to HSA accounts
  • Paid Parental Leave
  • Paid life insurance, short-term and long-term disability
  • Teladoc
  • 401(k) with a 100% match up to 4% of salary
  • Generous paid time off and holiday schedule
  • Cell phone reimbursement
  • Tuition reimbursement
  • Fulltime
Read More
Arrow Right

Protective Intelligence Analyst

The Protective Intelligence Analyst is responsible for monitoring global events,...
Location
Location
United States , Santa Clara
Salary
Salary:
100000.00 USD / Year
aus.com Logo
Allied Universal®
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must possess one of the following: Bachelor’s degree in Security Intelligence, Threat Analysis or related field of study
  • Minimum of seven (7) years of formal civilian or military intelligence analysis experience in which your primary role was as an Intelligence Analyst, supporting the full intelligence cycle.
  • Minimum of five (5) years of civilian or military intelligence analysis experience
  • Fusion Centre/law enforcement/customs/security intelligence/military/commercial intelligence background
  • International experience, cultural awareness and sensitivity
  • Strong research, analysis, and critical thinking skills with expertise in open-source intelligence, social media tools, and assessment techniques to identify and evaluate complex threats
  • Excellent written, oral, and presentation communication abilities, including report writing and briefing senior stakeholders
  • Proficient in Microsoft Office Suite, SharePoint, and other relevant tools for data management and reporting
  • Highly organized, detail-oriented, and capable of managing multiple priorities independently or collaboratively across time zones and compressed timelines
  • Initiative and business acumen with minimal supervision
Job Responsibility
Job Responsibility
  • Manage the “intelligence cycle” through the systematic collection, collation, evaluation, interpretation and analysis of information and process this into timely, accurate, and relevant intelligence
  • Assure quality of intelligence products
  • edit and validate reports prior to dissemination. Evaluate Global Security Operations Center (GSOC) staff basic intelligence work product
  • Assess intel procedures specific to the GSOC
  • develop/update guidance documents and processes to eliminate gaps in intelligence gathering and reporting
  • Responsible for producing intelligence products that will aid in mitigating risk, exposure, and impacts to the client’s corporate critical infrastructure (personnel, facilities and assets, business operations, and reputation), globally.
  • Prepare analyses, assessments, verbal briefs or other products by applying expert judgment and specialized experience in interpreting information and making decisions
  • Produce high-quality threat assessments, security alerts, country risk assessments, multi-media presentations and other relevant security and awareness products for dissemination to relevant audiences across the organization as determined by the Intelligence Analyst under the guidelines provided by Senior Management
  • Take initiative to develop new intelligence products and reporting methods to address emerging vulnerabilities
  • formalize and streamline internal processes
What we offer
What we offer
  • Employee Assistance Program
  • Employee Discount Program
  • Tuition Discount Program
  • Training & Career Development Programs
  • Fulltime
Read More
Arrow Right

Security Operations Center (SOC) Cyber Threat Senior Analyst

The Security Operations Center (SOC) Cyber Threat Analyst will be part of the Gl...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4-8 years of relevant experience in Cyber
  • Proven influencing and relationship management skills
  • Understand the life cycle of network threats, web attacks, attack vectors, and methods of exploitation
  • Ability to conduct analysis utilizing network traffic (packet capture), web logs, endpoint logs and others to identify unusual behavior that may indicate malicious activity
  • Proven and strong analytical skills
  • Attentive to detail and possess a strong investigative mindset
  • A good team player, self-driven and able to act as individual contributor
  • Consistently demonstrates clear and concise written and verbal communication
  • Relevant cyber security certification is a bonus
  • Regular weekly work shift will include one of the weekends (e,g, Saturday, Sunday)
Job Responsibility
Job Responsibility
  • Analyze security events to identify potential threats and intrusions. Events include but not limited to Intrusion Detection/Prevention tools, anomaly detection systems, Firewalls, Antivirus and EDR systems, proxy devices, cloud security solution and data leakage prevention system
  • Assess and investigate potential security threats sourced from other channel leveraging variety of data and tools
  • Drive a continuous effort to improve SOC process. Execute adhoc tasks or small projects as needed
  • Undertakes root cause analysis of events, perform risk assessment on threat or vulnerability and make recommendations to improve detection capability
  • Drive a continuous effort to review and fine tune detection rule/use case/signature to reduce unnecessary noise and increase alert fidelity
  • Handle threat incidents call like DDOS incidents, adhoc high severity cases including collaboration and escalation to other support groups
  • Participate in daily and adhoc conference calls, self-assessment processes and documentation related tasks
  • Stay updated with the latest cybersecurity trends, emerging threats and technologies
  • Fulltime
Read More
Arrow Right

Senior Professional Services Consultant

As a Senior Consultant for SOC Transformation & XSIAM Deployment, you will be a ...
Location
Location
United Kingdom , London
Salary
Salary:
Not provided
paloaltonetworks.it Logo
Palo Alto Networks Italia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • A proven track record in modernizing Security Operations Centers (SOCs) to achieve automation, AI-driven detection, and measurable improvements in MTTD/MTTR
  • Exceptional executive presence, with strong verbal and written communication skills to engage with stakeholders from the SOC analyst to the CISO
  • Experience acting as a trusted advisor to senior security leaders, with the ability to diagnose challenges and deliver strategic recommendations
  • 8+ years of hands-on experience in deploying and integrating SIEM/security analytics solutions within large enterprise environments
  • 6+ years of experience with Security Operations Center (SOC) tooling, processes, and workflows
  • Hands-on technical mastery across SIEM, SOAR, EDR, cloud security, and threat intelligence
  • Ability to conceive, architect, and develop effective correlation and detection rules
  • Familiarity with a range of SIEM technologies, such as Splunk and IBM QRadar, is a plus
  • Strong expertise in Regular Expressions (Regex)
  • Relevant bachelor's degree or industry-recognized qualifications (CISSP, GIAC, etc.), is a plus
Job Responsibility
Job Responsibility
  • Serve as the lead strategic advisor and subject matter expert for customers undertaking a full-scale SOC modernization with XSIAM
  • Lead multi-national SOC transformation programs, consolidating fragmented detection and response processes into a unified, AI-driven platform
  • Direct enterprise-scale XSIAM deployments, guiding customers from initial strategy to full operationalization
  • Devise and oversee comprehensive log ingestion strategies to ensure high-quality data fuels the XSIAM platform
  • Architect and implement sophisticated detection strategies and correlation rules to fortify customer defenses against advanced threats
  • Fine-tune and optimize log sources and correlation rules to maximize system performance and detection efficacy
  • Identify opportunities to enhance analyst alert handling and response through automation
  • Transform ambiguity into structured action plans, driving accountability at every level of a customer engagement
  • Build and mentor high-performing professional services teams that blend consulting, engineering, and change management expertise
  • Partner with Product and R&D teams to incorporate field insights into roadmap priorities
Read More
Arrow Right

Senior Professional Services Consultant - Automation

As a Senior Consultant for SOC Transformation & XSIAM / XSOAR Deployment, you wi...
Location
Location
Spain , Madrid
Salary
Salary:
Not provided
paloaltonetworks.it Logo
Palo Alto Networks Italia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • A proven track record in modernizing and transforming Security Operations Centers (SOCs) to achieve automation, AI-driven detection, and measurable improvements in MTTD/MTTR
  • Exceptional executive presence, with strong verbal and written communication skills to engage with stakeholders from the SOC analyst to the CISO
  • Experience acting as a trusted advisor to senior security leaders
  • Ability to diagnose challenges and deliver strategic recommendations
  • 10+ years of hands-on experience in deploying and integrating SIEM/security analytics solutions within large enterprise environments
  • 8+ years of experience with Security Operations Center (SOC) tooling, processes, and workflows
  • Hands-on technical mastery across SIEM, SOAR, EDR, cloud security, and threat intelligence
  • Ability to conceive, architect, and develop effective correlation and detection rules
  • Familiarity with a range of SIEM technologies, such as Splunk and IBM QRadar, is a plus
  • Strong expertise in Regular Expressions (Regex)
Job Responsibility
Job Responsibility
  • Serve as the lead strategic advisor and subject matter expert for customers undertaking a full-scale SOC modernization with XSIAM
  • Lead multi-national SOC transformation programs, consolidating fragmented detection and response processes into a unified, AI-driven platform
  • Direct enterprise-scale XSIAM deployments, guiding customers from initial strategy to full operationalization
  • Devise and oversee comprehensive log ingestion strategies to ensure high-quality data fuels the XSIAM platform
  • Architect and implement sophisticated detection strategies and correlation rules to fortify customer defenses against advanced threats
  • Fine-tune and optimize log sources and correlation rules to maximize system performance and detection efficacy
  • Identify opportunities to enhance analyst alert handling and response through automation
  • Transform ambiguity into structured action plans, driving accountability at every level of a customer engagement
  • Build and mentor high-performing professional services teams that blend consulting, engineering, and change management expertise
  • Partner with Product and R&D teams to incorporate field insights into roadmap priorities
  • Fulltime
Read More
Arrow Right

Security Operation Center (SOC) Cloud Analyst - Assistant Vice President

The Security Operation Center (SOC) Cloud Analyst is an intermediate level posit...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5-8 years of relevant experience
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills
  • Bachelor’s degree/University degree or equivalent experience
Job Responsibility
Job Responsibility
  • Monitor security events and alerts from cloud environments (e.g., AWS, Azure, Google Cloud) using security monitoring tools
  • Assist in the detection and investigation of security incidents in the cloud
  • Work with senior security team members to identify vulnerabilities in cloud systems and infrastructure
  • Assist in the preparation of security reports and documentation for audits and compliance
  • Collaborate with internal teams to implement cloud security best practices and mitigate risks
  • Participate in ongoing training and professional development opportunities in cloud security and cybersecurity
  • Fulltime
Read More
Arrow Right

Acquisition management and planning analyst

The SME-Level Acquisition Management and Planning Analyst performs a variety of ...
Location
Location
United States , El Segundo
Salary
Salary:
120000.00 - 150000.00 USD / Year
tecolote.com Logo
Tecolote Research
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 15 equivalent years of experience performing Acquisition Management and Planning activities in the government (military and/or civil servant), federally funded research and development center, or profit / non-profit government support / development Contractor arena
  • Knowledge of various quantitative techniques used to analyze data, develop models, interpret results and brief senior level DoD leadership
  • Must be able to work independently, as well as with a team, on time-sensitive high visibility tasks
  • Knowledge of DoD budgetary principles and procedures
  • Excellent written and verbal communication skills
  • Strong analytical skills and problem-solving abilities
  • Demonstrated knowledge of acquisition management regulations, practices, policies, and procedures associated with Major Defense Acquisition Programs
  • US citizenship is required
  • Master’s degree in Management, Business, Economics, Finance, Accounting, Mathematics, Engineering, Technology, or Operations Research is required
  • Active DoD Secret Clearance is required
Job Responsibility
Job Responsibility
  • Support the Material Leader with Acquisition Planning for the Missile Warning mission area
  • Interact with a multidisciplinary DoD technical workforce and defense hardware contractors in the accomplishment of their duties
  • Evaluate and support the development of program documentation, which includes acquisition strategies, systems engineering plans, Integrated Master Plans and Contract Data Requirements Lists, for adherence to DoD and Air Force policies and guidance
  • Perform market research and provide acquisition strategy recommendations
  • Advise and assist in organizing and establishing Integrated Product Teams
  • Analyze progress against program plan and schedule
  • Evaluate program plan for compliance with applicable DoD and Air Force policies and guidance
What we offer
What we offer
  • Company Paid Major Medical Insurance for employees and family members
  • Dental Insurance for employees and family members
  • Vision Insurance for employees (employee-paid for family members)
  • Group Life Insurance
  • Accidental Death and Dismemberment Insurance
  • Travel Accident Insurance
  • Long-Term Disability
  • Voluntary Short-Term Disability
  • Supplemental Life Insurance
  • Flexible Spending Account (pre-tax deferrals for health care expenses)
  • Fulltime
Read More
Arrow Right