×
Register Here to Apply for Jobs or Post Jobs. X

Soc Analyst

Job in Honolulu, Honolulu County, Hawaii, 96814, USA
Listing for: TEKsystems c/o Allegis Group
Full Time position
Listed on 2026-01-02
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Salary/Wage Range or Industry Benchmark: 50 - 60 USD Hourly USD 50.00 60.00 HOUR
Job Description & How to Apply Below

Aloha! One of Hawaii’s largest health insurers is seeking an experienced SOC analyst to join their team! Ideally, this person will have strong expertise in security orchestration, automation, and response (SOAR). This position will contribute to the IT Security Team in an enterprise level environment by leveraging Microsoft Sentinel and automation capabilities to enhance the company’s threat detection and incident response operations.

Additionally, he/she will aid in continuous improvement of security operations and provide mentorship to some of the more junior analysts as well. This position can sit fully remote but he/she must be able to work EST to allow overlap with HST, and provide additional support/coverage outside of Hawaii hours.

Top Skills
  • 4+ years hands‑on SOC experience
  • Proven experience with Microsoft Sentinel (workspace management, analytics rules, KQL queries, workbooks, and incident management)
Key Responsibilities
  • Monitor, analyze, and investigate complex security alerts and events using Microsoft Sentinel and integrated security tools
  • Design, develop, and maintain SOAR playbooks and automation workflows to streamline incident response processes
  • Perform in‑depth analysis of security incidents, including log correlation, threat hunting, and advanced analytics
  • Lead incident response efforts for medium to high‑severity security events, leveraging automated response capabilities
  • Create and optimize analytics rules, KQL queries, and detection logic within Microsoft Sentinel
  • Develop and refine SOAR workflows to reduce manual effort and improve response times
  • Conduct root cause analysis and provide detailed incident reports with remediation recommendations
  • Mentor junior SOC analysts on Microsoft Sentinel capabilities and best practices
  • Tune and optimize security orchestration workflows to minimize false positives and enhance detection accuracy
  • Stay current with emerging threats, SOAR technologies, and Microsoft Sentinel feature enhancements
  • Collaborate with IT, engineering, and stakeholders on security automation initiatives
Required Qualifications
  • Minimum 4 years of hands‑on experience in a SOC or security operations role
  • Active GIAC certification (GCIA, GCIH, GMON, GSEC, or other relevant GIAC credential)
  • Proven experience with Microsoft Sentinel (workspace management, analytics rules, KQL queries, workbooks, and incident management)
  • Demonstrated expertise in MS‑Sentinel as SOAR and security automation (playbook development, workflow orchestration, API integrations)
  • Strong knowledge of Windows operating systems and/or network security (protocols, traffic analysis, network architecture)
  • Experience with scripting and automation languages (Python, Power Shell, KQL)
  • Deep understanding of the cyber kill chain, MITRE ATT&CK framework, and common attack methodologies
  • Proven ability to analyze and respond to security incidents independently
  • Strong analytical, critical thinking, and problem‑solving skills
  • Excellent written and verbal communication skills
Preferred Qualifications
  • Microsoft Security certifications (SC-200: Microsoft Security Operations Analyst Associate)
  • Multiple GIAC certifications or other advanced security certifications (CISSP, CEH, OSCP)
  • Experience with Logic Apps, Azure Functions, or other Azure automation services
  • Knowledge of threat intelligence platforms and integration with Microsoft Sentinel
  • Experience with additional SOAR platforms (Palo Alto Cortex XSOAR, Splunk SOAR, etc.)
  • Proficiency with endpoint detection and response (EDR) tools, particularly Microsoft Defender
  • Experience with cloud security across Azure and other platforms (AWS, Google Cloud Platform)
  • Familiarity with digital forensics and malware analysis
  • Bachelor’s degree in Computer Science, Information Security, or related field
Job Type & Location

This is a contract position based out of Honolulu, HI.

Pay and Benefits

The pay range for this position is $50.00 – $60.00/hr.

  • Medical, dental & vision
  • Critical Illness, Accident, and Hospital
  • 401(k) Retirement Plan – Pre‑tax and Roth post‑tax contributions available
  • Life Insurance (Voluntary Life & AD&D for the employee and dependents)
  • Short and long‑term disability
  • Health Spending Account (HSA)
  • Transportation benefits
  • Employee Assistance Program
  • Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type

This is a hybrid position in Honolulu, HI.

Final date to receive applications

This position is anticipated to close on Dec 16, 2025.

Equal Opportunity Statement

The company is an equal‑opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.

#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary