Security Operations Center (SOC) Analyst – Incident Response jobs in United States
cer-icon
Apply on Employer Site
company-logo

Top Stack · 2 days ago

Security Operations Center (SOC) Analyst – Incident Response

Top Stack is seeking a skilled security operations analyst to join their team, responsible for the identification, triage, and response to security events and incidents. The role involves working with advanced security tools to analyze and investigate suspicious activities and maintain overall cyber resilience.

ConsultingHuman ResourcesRecruiting
check
Growth Opportunities
Hiring Manager
Shana Nelson
linkedin

Responsibilities

Monitor, correlate, and perform initial triage of security events and alerts to assess scope, urgency, and potential impact
Document and manage incidents from detection to resolution, ensuring detailed and accurate reporting
Conduct host-based forensic analysis across Windows, Linux, and macOS environments to detect suspicious or malicious activity
Maintain expertise in operating system internals and artifacts to support ongoing investigations
Analyze various data sources to identify and assess past or ongoing security threats
Provide after-hours on-call support (including weekends) as part of a rotational schedule for critical incident response
Execute threat hunting activities to proactively identify undetected threats and inform security tool improvements
Build and optimize SIEM dashboards to highlight incidents and monitor activity effectively
Tune and maintain security policies and configurations across tools like EDR, IPS, and content filters to minimize false positives and improve detection accuracy

Qualification

Security OperationsDigital ForensicsIncident ResponseSplunkEDR/XDR TechnologiesWindows AnalysisLinux AnalysisSIEM DashboardsLog AnalysisSoft Skills

Required

5 plus years of experience in security operations, digital forensics, incident response, vulnerability management, intrusion detection, or related areas
3-5 plus years of experience with Splunk, Linux and Windows Analysis
Hands-on experience with EDR/XDR technologies and/or open-source DFIR tools (e.g., KAPE, Plaso/Log2Timeline, Autopsy)
Strong understanding of Windows and Linux operating systems, including forensic artifacts and investigation techniques
Proficiency in analyzing logs, events, and other telemetry from various enterprise data sources
Experience creating SIEM dashboards and tuning security tools to enhance detection and reduce alert fatigue
Bachelor's degree in a related field or equivalent work experience

Company

Top Stack

twittertwittertwitter
company-logo
Top Stack is a staffing and recruiting company with an online search portal for various jobs in project consulting, finance, and software.

Funding

Current Stage
Early Stage

Leadership Team

leader-logo
Michael Masiello
Founder and Chief Executive Officer
linkedin
Company data provided by crunchbase