SOC Analyst
Chicago, Cook County, Illinois, 60290, USA
Listed on 2026-01-10
-
IT/Tech
Cybersecurity, Security Manager
About Protera
Welcome to Protera Technologies, where we’re reimagining how SAP-centric organizations work in the cloud. Since 1998, we’ve been pioneers in bringing SAP and related applications to the cloud—think Microsoft Azure and AWS. Our global crew, spanning the US with offices in Chicago (HQ), Athens, Greece, and Mumbai, India, is on a mission to make IT smoother, faster, and more fun for our clients.
But here’s the thing: we’re not your typical “serious tech company.” While we’re obsessed with delivering top-notch IT solutions, we’re all about keeping it real, approachable, and enjoyable. We work hard, but we also play hard—whether we’re collaborating on cloud optimizations, enhancing security, or just hanging out as a team.
At Protera, we believe in empowering SAP-centric organizations with the best tools and tech to drive growth, and we love what we do. Our values? Simple: stay curious, stay authentic, and make meaningful connections. We celebrate wins big and small, whether it's a successful project or a fun team event.
If you’re looking for a place where tech and fun collide, come join us and see what makes Protera a great place to work.
Shift Timing
- Rotational (24
* 7)
Work mode
- Remote
What You’ll Do
The SOC Analyst is responsible for maintaining the organization’s cybersecurity posture through continuous monitoring, detection, and incident response. Using advanced technologies such as Endpoint Detection and Response (EDR), Security Information and Event Management (SIEM), Network Detection and Response (NDR), File Integrity Monitoring (FIM), and Next-Gen Antivirus (NGAV), the analyst identifies and mitigates security threats in real time. This role also contributes to the design and development of automated playbooks using Security Orchestration, Automation, and Response (SOAR) platforms to streamline response workflows and improve SOC efficiency.
The analyst collaborates across teams to strengthen detection logic, enhance processes, and ensure proactive defense against evolving cyber threats.
- Monitor and analyze security alerts from SIEM, EDR, NDR, FIM, and Antivirus platforms to detect potential threats.
- Perform correlation and pattern analysis across multiple data sources to identify anomalies and sophisticated attack behaviors.
- Continuously tune and optimize detection rules to reduce false positives and improve fidelity.
- Execute incident response lifecycle activities including triage, containment, eradication, and recovery following NIST standards.
- Document incidents thoroughly, providing root cause analysis, attack vectors, and corrective actions.
- Support post-incident reviews to identify control gaps and recommend security improvements.
- Develop, maintain, and enhance incident response playbooks and runbooks to ensure standardized handling of recurring alerts and use cases.
- Collaborate with senior analysts to build SOAR playbooks for automated enrichment, containment, and notification workflows.
- Align playbooks with MITRE ATT&CK and Cyber Kill Chain frameworks to ensure comprehensive coverage of adversarial tactics.
- Conduct regular vulnerability assessments and coordinate with IT teams for timely remediation.
- Evaluate system configurations and network architecture for potential risks and ensure secure baselines.
- Track and report on vulnerability remediation metrics.
- Manage and optimize EDR, SIEM, SOAR, FIM, NDR, and Antivirus tools to ensure operational readiness.
- Integrate data sources and automate workflows between platforms for improved incident visibility and response time.
- Provide input on the design and deployment of new security solutions.
- Monitor File Integrity Monitoring (FIM) systems to detect unauthorized modifications in critical files and directories.
- Analyze and respond to Antivirus/NGAV alerts to prevent and contain endpoint infections.
- Validate cleanup and verify systems post-remediation.
- Leverage NDR tools to identify lateral movement, command-and-control…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).