Security Operations Center Analyst jobs in United States
cer-icon
Apply on Employer Site
company-logo

PRI Technology ยท 1 week ago

Security Operations Center Analyst

PRI Technology is a company focused on cybersecurity, and they are seeking a Security Operations Center Analyst to provide mentorship and lead incident response efforts. The role involves advanced investigations of security incidents, development of SOC processes, and collaboration across teams to enhance cyber defense capabilities.

Information Technology & Services
check
H1B Sponsor Likelynote

Responsibilities

Provide mentorship and technical oversight to L2 analysts and MSSP-led supporting staff, reviewing investigations and guiding escalation decisions
Lead incident response efforts for high-severity events, coordinating across teams to ensure effective containment and remediation
Contribute to the development and refinement of SOC processes, playbooks, and escalation protocols
Participate in hiring, onboarding, and training activities to build a high-performing SOC team
Conduct advanced investigations of security alerts and incidents, including malware analysis, lateral movement, and data exfiltration
Perform threat hunting using hypothesis-driven approaches and threat intelligence to uncover hidden threats
Develop and tune detection rules, correlation logic, and behavioral analytics across SIEM, EDR, and cloud platforms
Analyze attacker TTPs and translate them into actionable detections using frameworks such as MITRE Telecommunication & CK and the Cyber Kill Chain
Lead forensic investigations, including memory, disk, and network analysis, to support incident response and legal requirements
Collaborate with detection engineering and threat intelligence teams to improve detection coverage and response workflows
Serve as a key point of contact during major incidents, providing technical updates and risk assessments to leadership and stakeholders
Document investigation findings, incident timelines, and lessons learned in a clear and structured format
Support compliance and audit efforts by ensuring incident handling aligns with regulatory and policy requirements
Collaborate with IT, OT, and business units to ensure visibility and response capabilities across all environments
Contribute to SOC maturity assessments and strategic planning to enhance the organization's cyber defense posture

Qualification

SIEM proficiencyEDR proficiencyMalware analysisThreat huntingForensic investigationsCloud securityScripting/automationAdversary TTPsIndustry certificationsIncident response coordinationProcess improvementCommunication skillsTechnical leadershipStrategic thinking

Required

Bachelor's degree in Cybersecurity, Information Technology, or Computer Science (completed and verified prior to start)
Five (5) years of experience in a SOC or cybersecurity operations role, with at least 2 years in a senior or L3 capacity in a private, public, government or military environment
Proficiency in SIEM (e.g., Splunk, Sentinel), EDR (e.g., CrowdStrike, Carbon Black), and forensic tools
Strong understanding of Windows, Linux, and cloud environments (AWS, Azure, GCP) from a security perspective
Excellent communication skills, with the ability to convey complex technical issues to both technical and non-technical audiences
Senior-level expertise in leading complex investigations and responding to advanced cyber threats
Skilled in malware analysis, threat hunting, and forensic investigations across diverse environments
Proficient in developing detection logic and tuning analytics to identify sophisticated attacker behaviors
Strong understanding of adversary TTPs and frameworks like MITRE Telecommunication & CK and Cyber Kill Chain
Effective mentor and technical leader for junior analysts, fostering a culture of excellence in the SOC
Experienced in coordinating incident response efforts and communicating findings to stakeholders
Committed to continuous improvement of SOC processes, playbooks, and detection capabilities
Strategic thinker with the ability to assess risk, lead under pressure, and drive operational maturity

Preferred

Experience with scripting or automation (e.g., Python, PowerShell) is a plus
Familiarity with threat intelligence platforms, malware analysis tools, and adversary simulation frameworks
Industry certifications such as GCIA, GCIH, GCFA, OSCP, or equivalent are highly desirable

Company

PRI Technology

twitter
company-logo
IT Staffing Solutions - Experience the Difference Working With Professionals That Understand Your Information Technology Needs and the Importance of Managing Your Costs! PRI Technology, a division of Perennial Resources International, is a full service Information Technology staff augmentation and executive search firm comprised of high performing industry professionals focused on your success.

H1B Sponsorship

PRI Technology has a track record of offering H1B sponsorships. Please note that this does not guarantee sponsorship for this specific role. Below presents additional info for your reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2020 (1)

Funding

Current Stage
Growth Stage

Leadership Team

leader-logo
Joseph Kelly
Chief Financial Officer
linkedin
Company data provided by crunchbase