×
Register Here to Apply for Jobs or Post Jobs. X

Senior SOC Analyst

Job in Merrifield, Fairfax County, Virginia, 22118, USA
Listing for: NTT DATA North America
Full Time position
Listed on 2026-01-11
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Job Description & How to Apply Below
Location: Merrifield

Req : 342354

NTT DATA strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward‑thinking organization, apply now.

We are currently seeking a Senior SOC Analyst to join our team in Merrifield, Virginia (US-VA), United States (US).

Job Summary

The Senior SOC Analyst is a key member of the 24/7/365 Security Operations Center, serving as the escalation point for advanced investigations, incident response, and proactive threat hunting. This role conducts higher‑level analysis than other analysts on the team. A senior SOC analyst performs deep forensic investigations, correlates multi‑source threat intelligence information, and guides containment and remediation strategies. The Senior SOC Analyst identifies and mitigates advanced threats across enterprise IT endpoints, cloud environments, and OT systems.

They leverage frameworks like the MITRE ATT&CK framework to detect, disrupt, and prevent malicious activity from occurring in the enterprise environment.

They work closely with the SOC manager and leads, mentor junior staff, assist in refining SOC processes, and ensure the organization maintains a strong cybersecurity posture. They collaborate with engineers, threat intelligence and forensics teams to enhance detection capabilities, improve incident response readiness, and deliver actionable security insights to leadership.

Duties and Responsibilities
  • Lead advanced incident detection, investigation, and analysis efforts.
    • Correlate SIEM, EDR, IDS/IPS, and firewall data to identify and analyze potential incidents.
    • Perform deep‑div investigations to determine root cause, scope, and impact of incidents.
    • Apply MITRE ATT&CK and other frameworks for adversary TTP identification.
    • Conduct kill‑chain and supply‑chain analysis to understand and counter threats.
  • Coordinate and direct complex incident response activities.
    • Guide preparation, identification, containment, eradication, and recovery actions in collaboration with SOC, forensics and engineering teams.
    • Serve as the primary escalation point for high‑impact or advanced incidents.
    • Ensure incident handling aligns with established guidelines, response plans, and playbooks.
  • Conduct proactive threat hunting to identify emerging risks.
    • Analyze telemetry, logs, and behavioural patterns for indicators of compromise or attack.
    • Hunt for advanced persistent threats and undiscovered vulnerabilities.
    • Use advanced queries in SOC cybersecurity tools to detect anomalous or suspicious activity.
  • Work with forensic teams to ensure proper forensic collection, preservation, and analysis of digital evidence.
    • Coordinate with forensics teams to ensure chain‑of‑custody and evidence integrity.
    • Extract and analyse relevant artefacts to support investigations and post‑incident reviews.
    • Document and communicate forensic findings to stakeholders.
  • Develop and enhance SOC processes, playbooks, and detection capabilities.
    • Refine detection rules, alert thresholds, and automation workflows in SIEM/SOAR platforms and other cybersecurity tools.
    • Create SOPs, knowledge‑base articles, and training materials for SOC staff.
    • Recommend and guide implementation of new detection and analysis tools.
  • Perform threat intelligence collection, analysis and dissemination.
    • Gather threat data from internal, classified, and open‑source intelligence feeds.
    • Analyse and contextualise intelligence to produce actionable recommendations.
    • Share relevant threat information with SOC, leadership and partner teams.
  • Mentor and train SOC analysts to improve investigative capabilities and analytical thought process.
    • Provide real‑time guidance during active incidents.
    • Conduct regular training sessions, tabletop exercises and red/blue team drills.
    • Validate analyst findings and provide feedback designed to provoke thought, improve accuracy, and investigative thoroughness.
  • Collaborate with stakeholders to strengthen overall cybersecurity posture.
    • Work with engineering, IT, and cloud teams to address identified vulnerabilities.
    • Participate in tool evaluations, recommending solutions that enhance SOC capabilities and identify capability overlap.
    • Support internal…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary