Job Description We are at the forefront of transforming the future of technology in the financial industry, and we seek curious, practical individuals to help us pave the way. Our team is not intimidated by taking calculated risks, as they relish a good challenge and are eager to engage in problem-solving. As a member of our team, you will work alongside like-minded experts in a culture that is deeply rooted in innovation and progression. Join us to be part of a transformative journey that can shape the industry's future.
We are seeking a skilled and experienced SOC Analyst to play a crucial role in monitoring and analyzing our organization's security infrastructure, detecting and responding to potential threats and incidents, and ensuring the overall security of our systems.
What you will do:- Continuously monitor and triage security events and alerts across multiple platforms-such as Next-Gen SIEM, Microsoft 365 Defender, AWS native security, and other enterprise security tools-to identify anomalous activity, policy violations, and potential indicators of compromise (IOCs). This includes validating alert fidelity, escalating true positives, suppressing false positives, and maintaining situational awareness across the environment.
- Perform in?depth analysis and investigation of security incidents by correlating logs, endpoint telemetry, network traffic, identity activity, and threat intelligence to determine root cause, scope, impact, MITRE ATT&CK technique alignment, and potential business risk. This includes detailed investigation timelines, document evidence, and recommend containment, eradication, and recovery actions.
- Conduct proactive threat hunting using hypotheses based on emerging threats, adversary TTPs, behavioral analytics, and environmental risk indicators. Leverage SIEM queries, EDR telemetry, cloud audit logs, and threat intel feeds to identify stealthy threats such as lateral movement, persistence mechanisms, privilege misuse, or unauthorized data access.
- Develop clear, concise, and accurate reports on security incidents, active threats, root cause findings, vulnerabilities, and trending patterns for SOC management, InfoSec leadership, and cross?functional stakeholders. This includes post?incident summaries, incident metrics, threat trend analysis, and recommendations to strengthen preventive and detective controls.
- Collaborate closely with internal technology teams-including Cloud Engineering, Network Security, IAM, DevOps, and Governance/Risk/Compliance-to enhance security policies, improve detection coverage, update response playbooks, refine log source onboarding, and support the continuous maturation of the SOC's operational processes. Participate in tabletop exercises, control tuning, and strategic security initiatives to improve the organization's security posture.
- Adhere to established Security Operations Center service-level agreements (SLAs) for alert triage, investigation, escalation, and incident response to ensure timely risk mitigation and operational efficiency. Additionally, maintain SLA compliance for incident documentation, ticket updates, handoff notes, and closure guidelines aligned with SOC operating procedures and regulatory expectations.
- Participate in the SOC on?call rotation to provide after?hours support for high?severity security incidents, urgent investigations, and priority escalations. Responsibilities include responding to critical/high alerts within defined SLA timeframes, coordinating with cross?functional teams during major incidents, and ensuring continuous coverage to maintain 24/7 operational readiness.
- Participate in other duties as assigned to support overall Security Operations Center efficiency and organizational objectives.
What you will have:- 5+ years of experience working as a SOC Analyst or in a similar role.
- 3+ years of both knowledge and hands-on experience with NexGen SIEM, M365 Security Suite, Netskope, Proofpoint, Tanium, EDR solutions, and Qualys.
- 5+ years of experience with incident response procedures and methodologies.
- 5+ years of experience with specialized tools for analyzing malicious emails, malware, viruses, etc.
What is nice to have:- Relevant certifications, such as CISSP, IH are highly desirable.
The salary range for this role is $106,000- $141,000 plus competitive performance-based bonus. Compensation packages are based on a wide array of factors unique to each candidate, including but not limited to skill set, years and depth of experience, certifications, and specific office location. Compensation ranges may differ in differing locations due to cost of labor considerations.