Назад
Company hidden
12 часов назад

Senior SOC Analyst (Cybersecurity)

120 000 - 140 000$
Формат работы
hybrid
Тип работы
fulltime
Грейд
senior
Английский
b2
Страна
US
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Senior SOC Analyst (Cybersecurity): Leading complex investigations, high-priority incident response, and proactive threat hunting across endpoints, identity, email, cloud, and network environments with an accent on detection tuning and SOC workflow improvements. Focus on analyzing security telemetry, making real-time containment decisions, and mentoring junior analysts in a Microsoft-centric regulated environment.

Location: Hybrid (US) – Must be a U.S. citizen able to obtain and maintain U.S. Government security clearance

Salary: $120,000-$140,000

Company

hirify.global supports critical cybersecurity operations for regulated and defense-aligned organizations.

What you will do

  • Investigate and respond to complex security alerts, suspicious activity, and escalated incidents across endpoints, identity, email, cloud, and network.
  • Lead containment, eradication, and recovery actions per playbooks and make real-time escalation decisions.
  • Perform proactive threat hunting using SIEM, EDR/XDR, threat intelligence, and behavioral indicators.
  • Tune detections, improve alert logic, correlation rules, and SOC workflows to reduce false positives.
  • Analyze telemetry for account misuse, suspicious behavior, and indicators of compromise in Microsoft environments.
  • Document investigations, provide mentorship to junior analysts, and support audit readiness.

Requirements

  • Must be a U.S. citizen able to obtain and maintain U.S. Government security clearance (Active Secret preferred)
  • Bachelor’s degree in Cybersecurity, IT, Computer Science, or equivalent experience.
  • 5+ years in SOC, incident response, or cybersecurity operations.
  • Strong experience with SIEM, EDR/XDR, identity, email security, and threat monitoring platforms.
  • Proven leadership in alert triage, incident analysis, threat hunting, and independent incident handling.
  • Hands-on with CrowdStrike XDR and Microsoft-centric security (endpoint, identity, email, cloud).
  • DoD 8570/8140 certification (CySA+, CEH, CFR) or obtainable within 6 months.

Nice to have

  • Experience in regulated environments (NIST SP 800-171, CMMC, FedRAMP).

Culture & Benefits

  • Hybrid work arrangement.
  • Competitive salary and benefits package.
  • Casual, friendly, relaxed work environment.
  • Professional growth encouragement and support.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →