Senior SOC Analyst
Job in
Salt Lake City, Salt Lake County, Utah, 84193, USA
Listed on 2025-12-01
Listing for:
CaptionCall
Full Time
position Listed on 2025-12-01
Job specializations:
-
IT/Tech
Cybersecurity, Security Manager, Information Security, Network Security
Job Description & How to Apply Below
Job Summary
As a Senior SOC Analyst, you will serve as a senior lead responsible for monitoring, investigating, and responding to security threats. This role will focus on leading security investigations, incident response processes, threat detection, and security control validation to ensure a strong security posture across the organization. In addition, you will also be responsible for assessing MSSP performance, tuning security controls, and validating security technologies such as firewalls, cloud security configurations, and endpoint security solutions.
Essential Duties and Responsibilities:SOC:
Oversight, Threat Monitoring & Incident Response
- Oversee internal and external SOC resources (MSSP or internal teams), ensuring seamless collaboration, alignment and effective threat response.
- Define and manage SOC and Incident Response workflows, processes, and escalation procedures to maintain operational efficiency.
- Implement and maintain SOC and IR playbooks, runbooks, and automation to improve response times and reduce manual effort.
- Actively monitor security logs, SIEM alerts, and endpoint detections to identify potential threats.
- Lead and manage security investigations, ensuring accurate root cause analysis and timely mitigation.
- Manage and enhance incident response (IR) processes, including triage, containment, eradication, and recovery efforts.
- Leverage MITRE ATT&CK and similar frameworks to map incidents, assess gaps, and develop new detection logic.
- Conduct forensic analysis, malware investigations, and threat hunting to identify indicators of compromise (IOCs) and emerging threats.
- Utilize SOAR (Security Orchestration, Automation, and Response) platforms to automate response actions and improve incident handling efficiency.
- Investigate security incidents and recommend remediation actions to IT and business units.
- Work with security engineers to fine-tune SIEM correlation rules and alerting logic.
- Integrate external threat intelligence feeds into security monitoring tools and enhance threat detection and response capabilities.
- Conduct threat-hunting exercises to detect malicious activity not flagged by traditional monitoring.
- Track emerging threats, zero-day vulnerabilities, security advisories, adversary tactics, and security trends relevant to our environment. Provide executive reporting on incident trends, SOC effectiveness, and security improvements.
- Participate in red teaming and blue teaming and IR exercises.
- Support vulnerability and analysis, ensuring full visibility into security gaps.
- Collaborate with IT teams to enforce patch compliance, particularly for critical and high-severity vulnerabilities.
- Provide reports on vulnerability trends, security risks, and remediation progress.
- Track and document compliance metrics such as Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR).
- Conduct firewall rule reviews, cloud security assessments, and network security testing.
- Evaluate SIEM rules, endpoint security configurations, and cloud security controls for misconfigurations.
- Support vulnerability management efforts, ensuring timely remediation of identified risks.
- Assist in evaluating and testing new security tools, integrating them into SOC workflows.
- Act as a primary escalation point for MSSP investigations, ensuring appropriate response times and quality.
- Continuously assess MSSP effectiveness, ensuring SLAs and contractual obligations are met.
- Provide feedback on SOC detections, response procedures, and incident reporting from the MSSP.
- Partner with vendors to optimize security monitoring tools and improve detection logic.
Minimum of 4 Year / Bachelors Degree In related field
Preferred Certification:- CompTIA Security+, CEH (Certified Ethical Hacker), or GCIH (GIAC Certified Incident Handler), or GCIA (GIAC Certified Intrusion Analyst)
- CISSP (Certified Information Systems Security Professional) or CISM (Certified Information Security Manager) or SOC Analyst-focused certifications
- AWS/Azure security certifications
Position Requirements
10+ Years
work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×