Security Operations Center (SOC) Analyst (The Cyber Sentinel)

Unreal Gigs
San Francisco, CA, US
Full-time

Job Description

Job Description

Introduction :

Do you thrive on being the first line of defense against cyber threats? Are you passionate about monitoring, detecting, and responding to security incidents in real-time?

If you're a detail-oriented professional who loves investigating and stopping cyberattacks, then our client has the perfect opportunity for you.

We’re looking for a Security Operations Center (SOC) Analyst (aka The Cyber Sentinel) to join our security team and help protect our digital assets from evolving threats.

Imagine being the eyes and ears of the organization’s cybersecurity posture, where your expertise in threat detection and incident response helps protect critical infrastructure.

As a SOC Analyst at our client , you’ll monitor security events, analyze potential threats, and respond quickly to incidents.

This role is not just about reacting to security alerts it’s about proactively safeguarding systems and ensuring the organization’s security is rock solid.

Key Responsibilities :

  • Real-Time Threat Monitoring :
  • Continuously monitor security events and alerts through a SIEM platform to detect and investigate suspicious activities.

You’ll be responsible for identifying potential security breaches and ensuring that threats are neutralized before they escalate.

  • Incident Response and Investigation :
  • Act as the first responder to security incidents, conducting triage, analysis, and containment of threats. You’ll investigate alerts, determine the severity of incidents, and work with the team to mitigate risks and minimize impact.
  • Log Analysis and Correlation :
  • Analyze logs and network traffic from various sources (firewalls, IDS / IPS, antivirus, and endpoint protection tools) to identify signs of compromise.

You’ll use correlation rules to connect the dots and find hidden threats within the noise.

  • Threat Intelligence Integration :
  • Leverage threat intelligence feeds and external sources to stay ahead of emerging threats. You’ll integrate threat intelligence into the SOC to improve detection capabilities and ensure that security controls are updated with the latest threat data.
  • Incident Reporting and Documentation :
  • Document and report on security incidents, providing detailed analysis and recommendations for remediation. You’ll keep accurate records of all security events and incidents to help improve future responses.
  • SIEM Management and Optimization :
  • Fine-tune SIEM rules and alert thresholds to reduce false positives and improve detection accuracy. You’ll continuously improve monitoring processes and ensure that the SOC is running efficiently.
  • Collaboration and Escalation :
  • Collaborate with other security teams, such as vulnerability management and threat intelligence, to ensure a coordinated response to security incidents.

You’ll escalate incidents as needed and work with senior analysts to resolve complex issues.

Requirements

Required Skills :

SOC Expertise : Strong knowledge of security monitoring, incident detection, and incident response. You’re proficient with SIEM tools (e.

g., Splunk, QRadar, AlienVault), IDS / IPS, and endpoint detection and response (EDR) systems.

  • Analytical Skills : Exceptional analytical and problem-solving skills, with the ability to quickly assess security alerts, distinguish between false positives and true threats, and take appropriate actions.
  • Incident Response Experience : Hands-on experience responding to security incidents, including investigating and mitigating threats such as malware infections, phishing attacks, and network intrusions.
  • Threat Intelligence : Experience integrating and using threat intelligence feeds to improve detection capabilities. You’re able to identify patterns, correlate events, and anticipate emerging threats.
  • Communication Skills : Strong written and verbal communication skills, with the ability to clearly report on security incidents and explain technical details to non-technical stakeholders.
  • Adaptability : Ability to work effectively in a fast-paced environment where threats and challenges are constantly evolving.

You stay calm under pressure and thrive in high-stakes situations.

Humor : A great sense of humor, because even in the high-stakes world of SOC operations, we believe in creating a positive and enjoyable work environment.

If you can keep the team focused and upbeat during intense shifts, you’re our kind of analyst.

Educational Requirements :

  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field. Equivalent experience in SOC operations with a proven track record in incident response is also valued.
  • Certifications such as Certified SOC Analyst (CSA), CompTIA Security+, GIAC Certified Incident Handler (GCIH), or Certified Information Systems Security Professional (CISSP) are highly desirable.

Experience Requirements :

  • 3+ years of experience working in a SOC or cybersecurity environment, with hands-on experience monitoring, detecting, and responding to security incidents.
  • Experience with SIEM tools, such as Splunk, QRadar, or similar, and familiarity with endpoint detection and response (EDR) platforms.
  • Experience handling security incidents in industries with strict compliance requirements, such as finance, healthcare, or government, is a plus.

Benefits

Benefits :

  • Health and Wellness : Comprehensive medical, dental, and vision insurance plans with low co-pays and premiums.
  • Paid Time Off : Competitive vacation, sick leave, and 20 paid holidays per year.
  • Work-Life Balance : Flexible work schedules and telecommuting options.
  • Professional Development : Opportunities for training, certification reimbursement, and career advancement programs.
  • Wellness Programs : Access to wellness programs, including gym memberships, health screenings, and mental health resources.
  • Life and Disability Insurance : Life insurance and short-term / long-term disability coverage.
  • Employee Assistance Program (EAP) : Confidential counseling and support services for personal and professional challenges.
  • Tuition Reimbursement : Financial assistance for continuing education and professional development.
  • Community Engagement : Opportunities to participate in community service and volunteer activities.
  • Recognition Programs : Employee recognition programs to celebrate achievements and milestones.
  • 19 days ago
Related jobs
Promoted
Cloudflare, Inc.
San Francisco, California

We are the eyes and ears of Cloudflare, acting as the real-time voice of the customer to help communicate their needs and real-world use cases back to the rest of the company - for better service and future product development. Security Operations Center Analysts provide premium-level support for Cl...

Promoted
Garda World Security
San Francisco, California

Security Operations Center (SOC). Security Operations Center (SOC) experience. It is also the policy of GardaWorld Security Services not to honor requests that employees be assigned on the basis of sex or any other classification protected by law, unless such request is based on a bona fide occupati...

Promoted
Association of Academic Museums & Galleries.
San Francisco, California

The Deputy Director oversees the departments of security, facilities, the café, visitor services, events, and collections and exhibitions management, supervising managers in those areas; and working closely with the administration of the Vice Presidency for the Arts (VPA), the Deputy Director also h...

Promoted
The Center for Effective Philanthropy
San Francisco, California

While all CEP staff are at-will employees, due to an in-depth training period at the start of every Analyst’s tenure, our expectation is that analysts will stay in the role for a minimum of two years, assuming satisfactory performance. The YouthTruth team resides alongside staff in other departments...

The California State University
San Francisco, California

One year of graduate study in the social sciences, economics, mathematics, statistics, public or business administration, or engineering fields may be substituted for the required experience. The person holding this position may be considered a "mandated reporter" under the California Child Abuse an...

Exelixis
Alameda, California

The Associate Director, Product Management - Cybersecurity Operations & Engineering is also responsible for creating and maintaining the organization's cybersecurity architecture, including the design of security controls, policies, and procedures. Work closely with other security team members, such...

816 GPS Services, Inc.
San Francisco, California

Facilitate daily operations of the GSOC, encompassing diverse responsibilities such as risk intelligence, incident/crisis management, response to building intrusions, emergency communication, ensuring supply chain resilience, travel security, and implementing physical security measures. Global Secur...

Unreal Gigs
San Francisco, California
Remote

Are you a technical wizard with a passion for designing secure systems that can withstand the most sophisticated cyber threats? Do you thrive on creating robust architectures that balance security with business needs? If you’re a proactive, innovative thinker with a deep understanding of security pr...

JT4
San Francisco, California

The AO/DAA is responsible for granting or denying the ATO based on their assessment of the package. Prepare a Risk Assessment Report (RAR) that summarizes the risks identified and their potential impact on the organization. Submit the ATO package to the Authorizing Official (AO) or the Designated Ap...

Unreal Gigs
San Francisco, California
Remote

Are you a seasoned cybersecurity expert with the strategic vision to protect an organization’s most critical assets? Do you have the leadership skills to build and lead a world-class security team while navigating the complex landscape of modern threats? If you’re a leader who thrives on safeguardin...