×
Register Here to Apply for Jobs or Post Jobs. X

Senior SOC Analyst

Job in Chicago, Cook County, Illinois, 60290, USA
Listing for: Protera Technologies, Inc.
Full Time position
Listed on 2025-11-22
Job specializations:
  • IT/Tech
    Cybersecurity, IT Support, Network Security
Salary/Wage Range or Industry Benchmark: 150000 - 200000 USD Yearly USD 150000.00 200000.00 YEAR
Job Description & How to Apply Below

Job Title:
Senior SOC Analyst

Shift Timing: Rotational

Work mode: Remote, India

Role Overview:

Join a highly skilled and motivated team of Cyber Security Professionals tasked with protecting Protera Technologies and its customers. The Senior SOC Analyst role is focused on leading incident response efforts, threat hunting, digital forensics, and proactive security monitoring while providing mentorship and guidance to junior analysts. Leverage a next-generation SIEM, cyber case management, and supplementary tools to investigate, contain, and remediate cyber security incidents.

The ideal candidate is driven to learn and grow as the industry evolves and Protera Technologies adapts rapidly. While candidates may not possess every skill in the security analyst spectrum, a desire to learn, adaptability, and expertise in related disciplines are highly valued. Structured training and hands‑on experience will support your growth in this complex, fast‑paced service provider environment.

Responsibilities:

  • Lead and coordinate Incident Response investigations for Protera Technologies and its customers
  • Perform detailed analysis of logs and alerts to differentiate true security incidents from benign events
  • Discover and correlate relationships between seemingly unrelated information to identify threats
  • Conduct packet analysis of network traffic to obtain corroborating evidence for investigations
  • Lead incident response calls with internal teams and clients, ensuring clear communication, updates, and coordinated remediation actions
  • Provide guidance and mentorship to junior analysts on best practices, investigations, and tool usage
  • Coordinate with internal teams and clients to provide effective incident handling, containment, and remediation support
  • Continuously improve incident response and security operations procedures
  • Handle escalated security incidents tools like, SIEM, EDR, ITSM, email, phone, or in-person interactions
  • Manage security incidents through resolution and elevate or consult with leadership when required
  • Tune, troubleshoot, and optimize SIEM, EDR, NDR, and other security monitoring systems
  • Conduct proactive threat hunting and vulnerability assessments to identify emerging risks
  • Serve as the primary point of contact for clients during critical security incidents, providing status updates, guidance, and recommendations
  • Document all incident response actions and client communications to ensure audit readiness and post‑incident reporting

Qualifications:

  • Extensive experience reviewing and analysing log data from various network and security devices
  • Proficient with well‑known information security tools for packet capture, network/OS fingerprinting, and communications analysis
  • Strong familiarity with Windows and Linux operating systems, including command‑line operations
  • Solid foundation in networking fundamentals, including deep knowledge of TCP/IP and other core protocols
  • Knowledge of common network‑based services and client/server applications
  • Excellent verbal and written communication, interpersonal, and organizational skills
  • Proven ability to interact with clients professionally during high‑pressure situations
  • Strong problem‑solving skills for diagnosing technical issues and mitigating incidents
  • Ability to manage customer interactions professionally to ensure high satisfaction
  • Capacity to learn new technologies and concepts quickly
  • Willingness to work in shift rotations or on‑call schedules as needed

Preferred skills:

  • Experience in mission‑critical SOC or operations teams
  • In‑depth understanding of exploits, vulnerabilities, network intrusions, adversary tactics, and exfiltration techniques
  • Hands‑on experience with Malware Analysis, Phishing Email Analysis, Log Analysis, and Digital Forensics
  • Experience with FTK, Redline, EDR tools, and enterprise SIEM platforms
  • Familiarity with ITSM, IT GRC, and Cyber Case Management tools
  • Scripting knowledge (Python, Perl, Bash, Power Shell) to automate tasks and enhance SOC capabilities
  • Previous experience mentoring junior analysts or leading SOC initiatives
  • Strong client‑facing skills and ability to lead incident calls with technical and non‑technical stakeholders
About Company

Protera Technologies ()…

Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary