Senior Analyst, Security Operations Center
Listed on 2026-01-04
-
IT/Tech
Cybersecurity
Company Description
At Brightspeed, we are reimagining how people live, work, play and connect by providing fast, reliable internet connections and an awesome customer experience in twenty states throughout the Midwest and South.
Backed by funds managed by Apollo Global Management,our vision is to accelerate the upgrade of copper to fiber optic technologies, bringing faster and more reliable internet service to many rural markets traditionally underserved by broadband providers, while delivering best-in-class customer experience.
Be a part of the team that will make this vision a reality....designing and building a world class fiber network and creating a customer experience second to none.
Check us out on the web!
Job DescriptionJob Summary
The Senior Analyst, Security Operations Center (SOC) is a technical leader responsible for advanced threat detection, incident response, and continuous improvement of Brightspeed's enterprise security monitoring capabilities. Operating in a 24x7 environment, this role leads complex investigations, coordinates multi-team response efforts, and develops advanced detection and automation capabilities. The Senior Analyst mentors junior analysts, contributes to SOC strategy and roadmap development, and plays a key role in strengthening Brightspeed's security posture through proactive threat hunting, refined detection logic, and operational excellence.
Key Responsibilities
Incident Response Leadership & Coordination
- Lead incident response efforts for high-severity and complex security events, serving as the primary technical coordinator during major incidents.
- Act as escalation point for junior analysts, providing technical guidance and decision support in real time.
- Oversee daily SOC operations, including shift management, workload distribution, and quality assurance of investigations.
- Conduct post-incident reviews and facilitate lessons-learned sessions to drive continuous improvement.
- Mentor and train junior analysts to elevate team capabilities and strengthen overall SOC maturity.
Advanced Threat Detection & Analysis
- Perform advanced threat analysis, including APT detection, multi-stage attack correlation, and deep analysis of threat actor tactics, techniques, and procedures (TTPs).
- Lead proactive threat hunting initiatives across cloud, network, identity, and endpoint environments.
- Design and implement advanced detection rules, correlation logic, queries, and dashboards in SIEM and SOAR platforms.
- Develop custom automation playbooks to accelerate investigation, triage, and containment processes.
- Evaluate and recommend enhanced SOC technologies, detection techniques, and analytic capabilities.
Strategic SOC Process & Program Ownership
- Lead continuous improvement initiatives for SOC processes, workflow automation, detection coverage, and operational efficiency.
- Develop SOC documentation including advanced runbooks, SOPs, and knowledge base articles.
- Contribute to SOC strategic planning, metrics, KPIs, and roadmap initiatives aligned with Security leadership.
- Support transformational projects such as AI-driven detection, automation frameworks, and maturing detection-as-code practices.
- Collaborate closely with Threat Intelligence, Engineering, IT, and Network teams to align detection and response capabilities with enterprise risk priorities.
Operational Responsibilities
- Monitor, triage, and analyze security alerts from SIEM, SOAR, EDR/XDR, DLP, CASB, and cloud security tools.
- Provide prescriptive remediation guidance across IT and Network operations teams.
- Document investigations, root cause analyses, and recommendations for prevention and long-term mitigation.
- Participate in a 24x7 on-call rotation, including night shifts as required, for escalated incidents.
WHAT IT TAKES TO CATCH OUR EYE:
- Associate's degree in Computer Science, Information Systems, Engineering, Technology, or related field or equivalent experience/training
- Experience managing cases/incidents
- Ability to think analytically
- Robust creativity and problem-solving skills
- Knowledge of technical systems and terminology
- Proficiency in threat management analysis and dissemination
- Proficiency in scripting languages
- Advanced written and verbal communication skills
BONUS POINTS FOR:
- Bachelor's Degree in Computer Science, Information Systems, Engineering, Technology, or related field or equivalent experience/training
- Information Security Certification, preferred:
- GSEC
- Security+
- GIAC
- Python or Power Shell scripting
- Azure Sentinel and Crowd Strike experience
- A solid understanding of networking, cyber security concepts
- Aptitude in solving problems independently
- Demonstrated problem-solving skills
- Sound decision-making ability
- Must be detail oriented, well organized, thrive in a sense-of-urgency environment, leverage best practices, and most importantly, innovate through any problem with a can-do attitude
- Strong analytical and time management skills
#LI-RW1
Additional InformationWHY JOIN US?
We aspire to contemporary ways of working.
We are committed to being a…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).