Senior SOC Analyst

Overview

On Site
Depends on Experience
Full Time
No Travel Required

Skills

SOC Analyst
SIEM
NIST SP 800
ncident Response Plans
CISSP
CISM
GIAC
AWS
Azure
CrowdStrike
MS Sentinel
EDR
threat intelligence
cybersecurity
Splunk
Q-Radar
Microsoft Sentinel
Securonix
GCIA
GCFA
MITRE ATT&CK

Job Details

Title: Senior SOC Analyst Location: New York, NY Night Shift

Duration: 12 Months contract

SCOPE OF SERVICES TASKS:
Monitor, detect, and analyze security events across enterprise networks, endpoints, and cloud environments using government-approved SIEM and monitoring platforms.
Conduct in-depth investigations of suspected security incidents and prepare incident reports.
Provide threat intelligence analysis and correlate findings with organizational risks.
Develop, review, and update security policies, procedures, and standards.
Collaborate with IT, DevOps, and business units to implement secure configurations and architectures.
Recommend and implement security automation for log analysis, alerting, and response.
Prepare executive-level briefings and metrics on cybersecurity risks, incidents, and trends.
Perform cyber incident triage, investigation, containment, eradication, recovery, and reporting in accordance with NIST SP 800-61 and agency Incident Response Plans.
Conduct threat intelligence analysis and provide situational awareness reports to agency leadership.
Draft, update, and maintain cybersecurity policies, procedures, standard operating procedures (SOPs), and training documentation.
Participate in agency cyber exercises, penetration testing support, and red team/blue team activities.

MANDATORY SKILLS/EXPERIENCE Note: Candidates who do not have the mandatory skills will not be considered.
Minimum of eight (8) years of cybersecurity experience with at least three (3) years in a senior or lead analyst capacity.
Strong knowledge of security operations, incident response, and threat intelligence.
Demonstrated experience with enterprise SIEM tools (e.g., Splunk, Q-Radar, Microsoft Sentinel, Securonix) and endpoint detection and response EDR platforms (CrowdStrike, MS Sentinel).
Proficiency in network security, endpoint protection, and cloud security (AWS/Azure/Google Cloud Platform).
Strong understanding of frameworks such as NIST CSF, CIS Controls, MITRE ATT&CK.
Proficiency in cyber incident handling and forensic analysis.
Strong written and oral communication skills to brief executive leadership and technical staff.
Bachelor s degree in computer science, Information Security, or related field (or equivalent experience).

DESIRABLE SKILLS/EXPERIENCE:
Industry certifications: CISSP, CISM, GIAC (GCIH, GCIA, GCFA), CEH, or equivalent.
Experience working in highly regulated industries (government, healthcare, financial services, utilities).
Knowledge of secure software development lifecycle (SSDLC) and DevSecOps practices.
Familiarity with Zero Trust architectures and identity security.
Advanced scripting skills (Python, PowerShell, Bash) for automation and log analysis.
Experience with SOAR platforms for automated incident response

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.