CrawlJobs Logo

Sr. SOC Analyst

pipercompanies.com Logo

Piper Companies

Location Icon

Location:
United States , Newington

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

130000.00 - 165000.00 USD / Year

Job Description:

Zachary Piper Solutions is currently seeking a Sr. SOC Analyst to support a DoD program that is based in Newington, VA. This position is a full time role that will be fully onsite. This position is critical in safeguarding our network and assets, ensuring robust security measures and procedures are maintained. As a SOC Analyst, you will play a pivotal role in incident response, threat hunting, and security analysis within a high-stakes environment protecting substantial assets.

Job Responsibility:

  • Lead complex security incident responses, from post-breach analysis to threat actor identification, leveraging netflow, PCAP analysis, and security event logs to identify and mitigate lateral movements and escalations
  • Demonstrate proficiency in writing and understanding Snort (or Defender) rules, with a strong capability in utilizing SIEM tools, specifically Splunk, for detailed incident analysis and resolution
  • Engage in proactive threat hunting, leveraging network data, netflows, and PCAPs for detailed analysis, and employing log information analysis (sysmon, event ID, registry rights) to preemptively identify and neutralize threats
  • Interacts with the team daily to deliver on the customer’s requirements
  • Communicates with the team and other work centers to secure the customer’s cloud and on-prem environments
  • Able to work on a team that supports a mission focused customer with high expectations
  • Triages and resolves events and incidents successfully defending the customer’s environments with multiple boundaries
  • Utilizes technical knowledge, interpersonal skills and grit to solve challenging operational requirements

Requirements:

  • 5+ years of SOC experience
  • Bachelors Degree in Cybersecurity or related field
  • Security+ or equivalent certification
  • Active TS/SCI Clearance
What we offer:

Medical, Dental, Vision, 401K, PTO, Sick Leave if Required by Law

Additional Information:

Job Posted:
January 06, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Sr. SOC Analyst

Sr SOC Analyst

Apex Systems is currently hiring for a Sr SOC Analyst with one of our large Bank...
Location
Location
United States , Chandler
Salary
Salary:
53.60 - 56.60 USD / Hour
apexsystems.com Logo
Apex Systems
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience SOC experience
  • Any EDR - Crowdstrike is a huge plus
  • Any SIEM/SOAR - Splunk with SPL and Google Security Operations SIEM are preferred/plus
  • Network analysis - Netwitness (primary) and Wireshark
  • File analysis - Splunk Attack Analyst (Twinwave)
  • Case Management - tool agnostic, but Palo Alto XSOAR is a plus
  • Good communication skills – will need to work with peer teams onshore and offshore
  • Passionate about cybersecurity
Job Responsibility
Job Responsibility
  • Working tickets out of the queue – XSOAR and Splunk
  • Mentor and upskill junior analysts
What we offer
What we offer
  • Medical, dental, vision, life, disability, and other insurance plans
  • ESPP (employee stock purchase program)
  • 401K program with company match after 12 months
  • HSA (Health Savings Account on the HDHP plan)
  • SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions
  • Corporate discount savings program
  • On-demand training program
  • Access to certification prep and a library of technical and leadership courses/books/seminars after 6+ months
  • Certification discounts and other perks to associations (CompTIA, IIBA)
  • Dedicated customer service team
  • Fulltime
Read More
Arrow Right

Sr SOC Analyst

The Senior SOC Analyst is responsible for detection, triage, and response operat...
Location
Location
United States , West Conshohocken; Frisco
Salary
Salary:
Not provided
legendsglobal.com Logo
Legends Global
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven experience in a SOC or equivalent detection & response function
  • 3-5 years in Security Operations, Detection & Response, or Incident Handling (SOC experience required)
  • Hands-on experience with SIEM (e.g., SecOps, Sentinel, QRadar), EDR (e.g., CrowdStrike, Defender, SentinelOne), and SOAR platforms
  • Proficient in authoring detections, rule tuning, enrichment pipelines, and alert routing
  • Demonstrated capability in building and executing IR playbooks and containment/eradication plans
  • Experience conducting post-incident reviews and RCAs, and delivering corrective action plans to engineering teams
  • Scripting skills (Python/PowerShell/Bash) for automation, enrichment, and data wrangling
  • Excellent written communication for case documentation and executive-ready incident summaries
Job Responsibility
Job Responsibility
  • Build and operationalize SOC playbooks and escalation workflows
  • Lead alert triage, enrichment, and false-positive suppression
  • Author detection requirements
  • write and tune SIEM rules
  • Develop hunt hypotheses
  • lead hunt programs using advanced elemetry and signals intelligence
  • Design detection strategies across the kill chain
  • drive enterprise detection strategy
  • Execute incidents end-to-end: containment/eradication, documentation, and communication
  • Conduct post-incident reviews and drive remediation and control improvements
What we offer
What we offer
  • medical
  • dental
  • vision
  • life and disability insurance
  • paid vacation
  • 401k plan
  • Fulltime
Read More
Arrow Right

Sr. Cybersecurity Incident Response Analyst

Blue Yonder, a leading supply chain software company, is seeking a Sr Cybersecur...
Location
Location
Mexico , Monterrey; Mexico City
Salary
Salary:
Not provided
blueyonder.com Logo
Blue Yonder
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Information Security, or related equivalent experience
  • 5+ years of experience in information security or cybersecurity as an analyst, engineer or consultant
  • MUST have experience with incident response methodologies and tools (e.g. SANS IR, EDR, SIEM, Threat Intelligence, etc.)
  • Strong technical skills and attention to detail
  • Excellent verbal and written communication skills
  • Ability to work independently and as part of a team
  • Ability to work under pressure and in a fast-paced environment
  • Strong problem-solving skills and a proactive approach to work
  • Knowledge of security frameworks such as NIST and ISO 27001
  • Familiarity with security regulations and standards (e.g. PCI DSS, HIPAA, etc.)
Job Responsibility
Job Responsibility
  • Monitor and Analyze Security Alerts – Review alerts generated by security systems, appliances, and logs to determine the appropriate course of action to protect the enterprise and reduce overall risk
  • Incident Triage and Response – Quickly assess, prioritize, and respond to security incidents, ensuring timely containment, eradication, and recovery to minimize business impact
  • Root Cause Analysis (RCA) – Investigate security incidents to determine root causes, attack vectors, and vulnerabilities, providing recommendations to reduce the attack surface and prevent recurrence
  • Threat Hunting and Proactive Defense – Conduct proactive threat-hunting activities based on intelligence, anomalies, and adversary tactics to identify and mitigate threats before they escalate
  • Collaboration with Cross-Functional Teams – Work closely with IT, engineering, legal, compliance, and other teams to coordinate incident response efforts and ensure an effective security posture
  • Incident Documentation and Reporting – Maintain detailed documentation of security incidents, response actions, and lessons learned, ensuring continuous improvement in security processes
  • Develop and Improve Incident Response Playbooks – Enhance and maintain incident response procedures, ensuring alignment with industry best practices and emerging threats
  • Security Awareness and Training – Provide guidance, training, and mentorship to SOC analysts and IT staff on security threats, incident handling, and response best practices
  • Threat Intelligence Integration – Leverage threat intelligence sources to stay informed on evolving cyber threats and proactively adjust security strategies to defend against them
  • Fulltime
Read More
Arrow Right
New

Sr Principal Professional Services Engineer

As a Principal Consultant for SOC Transformation & XSIAM Deployment, you will be...
Location
Location
Germany , Berlin
Salary
Salary:
Not provided
paloaltonetworks.it Logo
Palo Alto Networks Italia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • A proven track record in modernizing Security Operations Centers (SOCs) to achieve automation, AI-driven detection, and measurable improvements in MTTD/MTTR
  • Exceptional executive presence, with strong verbal and written communication skills to engage with stakeholders from the SOC analyst to the CISO
  • Experience acting as a trusted advisor to senior security leaders, with the ability to diagnose challenges and deliver strategic recommendations
  • 10+ years of hands-on experience in deploying and integrating SIEM/security analytics solutions within large enterprise environments
  • 8+ years of experience with Security Operations Center (SOC) tooling, processes, and workflows
  • Hands-on technical mastery across SIEM, SOAR, EDR, cloud security, and threat intelligence
  • Ability to conceive, architect, and develop effective correlation and detection rules
  • Familiarity with a range of SIEM technologies, such as Splunk and IBM QRadar, is a plus
  • Strong expertise in Regular Expressions (Regex)
  • Relevant bachelor's degree or industry-recognized qualifications (CISSP, GIAC, etc.), is a plus
Job Responsibility
Job Responsibility
  • Serve as the lead strategic advisor and subject matter expert for customers undertaking a full-scale SOC modernization with XSIAM
  • Lead multi-national SOC transformation programs, consolidating fragmented detection and response processes into a unified, AI-driven platform
  • Direct enterprise-scale XSIAM deployments, guiding customers from initial strategy to full operationalization
  • Devise and oversee comprehensive log ingestion strategies to ensure high-quality data fuels the XSIAM platform
  • Architect and implement sophisticated detection strategies and correlation rules to fortify customer defenses against advanced threats
  • Fine-tune and optimize log sources and correlation rules to maximize system performance and detection efficacy
  • Identify opportunities to enhance analyst alert handling and response through automation
  • Transform ambiguity into structured action plans, driving accountability at every level of a customer engagement
  • Build and mentor high-performing professional services teams that blend consulting, engineering, and change management expertise
  • Partner with Product and R&D teams to incorporate field insights into roadmap priorities
Read More
Arrow Right
New

Principal Engineer - Data Scientist

The Data-Driven Security & Analytics team at Wells Fargo is at the forefront of ...
Location
Location
United States , ISELIN; CHARLOTTE; IRVING
Salary
Salary:
159000.00 - 305000.00 USD / Year
https://www.wellsfargo.com/ Logo
Wells Fargo
Expiration Date
March 11, 2026
Flip Icon
Requirements
Requirements
  • 7+ years of Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
  • Strong proficiency in Python (pandas, scikit-learn, XGBoost/LightGBM/CatBoost, PyTorch/TensorFlow, PySpark) and experience with ML experimentation frameworks (MLflow, Weights & Biases, etc.)
  • Deep understanding of supervised & unsupervised learning, imbalanced classification, anomaly/outlier detection, time-series analysis, and ensemble techniques
  • Hands-on experience deploying models into real-time production environments (e.g., via APIs, Kafka consumers, Spark Streaming, or low-latency serving platforms)
  • Solid SQL skills and comfort working with large-scale data warehouses/lakehouses (Snowflake, Databricks, BigQuery)
  • Proven track record of delivering measurable business impact (e.g., fraud loss reduction, false-positive rate improvement, detection rate lift) in regulated environments
Job Responsibility
Job Responsibility
  • Act as an advisor to leadership to develop or influence applications, network, information security, database, operating systems, or web technologies for highly complex business and technical needs across multiple groups
  • Lead the strategy and resolution of highly complex and unique challenges requiring in-depth evaluation across multiple areas or the enterprise, delivering solutions that are long-term, large-scale and require vision, creativity, innovation, advanced analytical and inductive thinking
  • Translate advanced technology experience, an in-depth knowledge of the organizations tactical and strategic business objectives, the enterprise technological environment, the organization structure, and strategic technological opportunities and requirements into technical engineering solutions
  • Provide vision, direction and expertise to leadership on implementing innovative and significant business solutions
  • Maintain knowledge of industry best practices and new technologies and recommends innovations that enhance operations or provide a competitive advantage to the organization
  • Srategically engage with all levels of professionals and managers across the enterprise and serve as an expert advisor to leadership
  • Research, design, develop, and productionize machine learning models for fraud detection (supervised, unsupervised, semi-supervised), anomaly detection, behavioral biometrics, network intrusion detection, account takeover prevention, and synthetic identity fraud
  • Build and maintain real-time and near-real-time scoring pipelines that deliver sub-second fraud/attack predictions during payment authorization, login, and high-risk interactions
  • Perform advanced feature engineering on complex, heterogeneous data sources (transactional, temporal, graph-based, textual threat intel, device & behavioral signals) to create high-signal features for model training and inference
  • Apply techniques such as graph neural networks, sequence modeling (LSTM/Transformer), ensemble methods, autoencoders, isolation forests, contrastive learning, and adversarial robustness to address evolving fraud and cyber threats
What we offer
What we offer
  • Health benefits
  • 401(k) Plan
  • Paid time off
  • Disability benefits
  • Life insurance, critical illness insurance, and accident insurance
  • Parental leave
  • Critical caregiving leave
  • Discounts and savings
  • Commuter benefits
  • Tuition reimbursement
  • Fulltime
!
Read More
Arrow Right

Sr. Manager, Security Engineering

This is a high-visibility leadership role within the Security organization, repo...
Location
Location
United States
Salary
Salary:
232000.00 - 278000.00 USD / Year
illumio.com Logo
Illumio
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Demonstrable experience leading and managing global teams in a technology company
  • At least 3 years in a people management position
  • 3-5 years hands-on technical experience in Incident Response and Security Operations roles
  • Cloud Security experience required, preferably across multiple cloud platforms such as Azure and AWS
  • Deep understanding of Security Tools and Technologies such as Sentinel, Defender for Cloud, CSPM tools, WAF, IAM, EDR, DLP
  • Experience measuring SOC/SIEM performance and reporting metrics
Job Responsibility
Job Responsibility
  • Help shape the strategic direction of the Security Program with knowledge and experience in all facets of Detection, Response and Recovery
  • Guide and support a global team of SOC Analysts, Security Engineers, Incident Responders and Threat Hunters
  • Drive use of Illumio’s own products to keep us secure and improve core capabilities for our customers by providing direct feedback to our Product Management teams
What we offer
What we offer
  • Medical, Dental, Vision Coverage
  • Health and Dependent Savings Accounts
  • Life and Disability Programs
  • Paid Parental Leave
  • Voluntary Benefit Programs
  • Company Sponsored Wellness Program
  • Wellness Reimbursement Program
  • Retirement Savings
  • Equity Opportunities
  • Paid time off and Paid Holidays
  • Fulltime
Read More
Arrow Right

Sr Solution Architect

Do you enjoy solving problems, looking at problems through a different lens, and...
Location
Location
United Kingdom , Multiple Locations
Salary
Salary:
Not provided
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven success and expertise in architecting innovative solutions primarily in a client-facing role
  • Ability to quickly build relationships and credibility with customers
  • Ability to build trust to drive change with customers
  • Track record of delivering quality solutions as a technical leader
  • Executes recognized Architectural methods, processes and tools
  • A passion for learning about and experimenting with new technologies
  • Confidence in creating and delivering technical presentations and training
  • Excellent organization and planning skills
  • Bachelor’s degree relevant to Information Technology/Computer Science, Engineering (or equivalent)
  • Technical knowledge of Microsoft security and identity technologies, such as Active Directory, Azure Active Directory, Microsoft Defender, Azure, Azure Security Center, and Sentinel
Job Responsibility
Job Responsibility
  • Business to Technology Strategy: Articulating value propositions for the most strategic Microsoft products and services
  • Actively and insightfully listen to translate and articulate customer challenges and translate these to business objectives and project outcomes
  • Support the sales process and provide input on contract, staffing, assumptions and risks
  • Quantify she needs of the business to achieve value outcomes, champion required methodology, capture/reuse IP and share best practices
  • Demonstrate ability to match technical solutions with customer business requirements
  • Technology Delivery Management: Strong leadership of Technical Delivery teams, driving high performance and collaboration in complex matrix environments
  • Demonstrate an understanding of and champions Customer/Partner Change management and adoption principles
  • Own Delivery Excellence
  • Demonstrate expertise in chosen field, drive opportunities to accelerate the adoption of the Microsoft Cloud
  • Drive and support innovation focusing on industry solutions and customer business outcomes on the Microsoft platform
  • Fulltime
Read More
Arrow Right

Sr. Product Marketing Manager

At Corelight, we believe that the best approach to cybersecurity risk starts wit...
Location
Location
United States
Salary
Salary:
160000.00 - 175000.00 USD / Year
https://corelight.com/ Logo
Corelight
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years product marketing experience
  • Prior cybersecurity industry experience is required
  • 2-3 years experience in the threat intelligence domain is preferred
  • Experience building go-to-market strategies & assets that helped close F2000 accounts
  • Proven ability to understand and distill technical concepts into clear, compelling prose
  • You have a bias toward action and DIY
  • prior high-growth startup experience helps
  • You understand opportunity costs and can tactfully decline low ROI opportunities
Job Responsibility
Job Responsibility
  • Market Intelligence: Be an expert on our buyers, who they are, how they buy, and key decision criteria and channels to influence the buyers
  • Positioning and Messaging: Collaborate with the product management team to develop positioning and messaging to position and evangelize Corelight’s comprehensive detection strategy
  • Evangelism: Develop threat detection-related content for our sales and marketing that differentiates Corelight from our competition, and messaging that speaks to the pain points and challenges of our target personas including CISOs, SOC leaders, and security practitioners
  • Sales Enablement: Educate and engage our sales, account management, and customer success teams on new detection capabilities and industry trends
  • Field ad hoc content and support requests from the sales team
  • Content Development and Management: Develop and manage content to drive thought leadership and demand-gen including blogs, campaign assets, webinars etc. to drive awareness and influence buying decisions for our target decision makers
  • Support Analyst and Field Engagements: Support industry analyst outreach efforts and field events with the right collateral
What we offer
What we offer
  • Equity
  • additional benefits
  • Fulltime
Read More
Arrow Right