About The Position

We are seeking a senior-level, highly accomplished SOC Analyst with deep expertise in incident response and a proven track record of leading complex, cross-functional security initiatives. We are looking for advanced experience in threat mitigation and threat hunting, along with strong capabilities in security automation and cloud security across modern enterprise environments. As a SOC Analyst, you will play a pivotal role within McAfee’s SOC, serving as the first line of defense. Utilizing an array of defensive tools, you will conduct thorough analyses, fortify security controls, and spearhead cross-functional team efforts. With a strong customer-centric approach, you will ensure a secure and resilient workspace for McAfee’s workforce. This position is located in US either in San Jose, CA or Frisco, TX. You will be required to be onsite on an as-needed basis. We are only considering candidates within a commutable distance to one of the two locations and are not offering relocation assistance at this time.

Requirements

  • 5+ years experience in a similar role.
  • Solid critical thinking and analytical skills.
  • Experience leading efforts during one or more phases of Incident Response lifecycle.
  • Application of cybersecurity principles and risk management basics to mitigate risk.
  • Experience leading & collaborating with multiple teams to drive improvements and resolutions.
  • Cloud security monitoring – detection and response (AWS, GCP and Azure)
  • Application security.
  • DDOS protection.
  • AWS Cloud security.
  • Threat intelligence.
  • Endpoint security – CrowdStrike.

Responsibilities

  • Work cross functionally to resolve security incidents, to improve security posture of McAfee’s infrastructure.
  • Perform event correlation using information gathered from a variety of sources to gain situational awareness to detect, confirm, contain, remediate, and recover from cyber-attacks.
  • Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
  • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information; Perform root cause analysis to determine tactics, techniques, and procedures (TTPs) for intrusions.
  • Notify SOC managers and cyber incident responders of suspected cyber incidents in accordance with the cyber incident response plan and procedures
  • Exercise user-oriented approach while handling security incidents to ensure that user impact is minimized as much as possible, and the situation is well articulated to users.
  • Document ongoing incidents, after action reports and escalate incidents
  • Provide cybersecurity recommendations to leadership based on significant threats and vulnerabilities.
  • Monitor external data sources to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise.
  • Support Incident Response efforts - evidence collection, documentation, communications, and reporting.
  • Responsible for the enforcement of corporate information security policies to protect McAfee's information assets and intellectual property.
  • Lead or contribute to security risk assessments that determine threats, consequences, and vulnerabilities to key assets, products, and services.
  • Recommend and drive additional security controls to meet current and future needs.

Benefits

  • Bonus Program
  • 401k Retirement Plan
  • Medical, Dental, Vision, Basic Life, Short Term Disability and Long-Term Disability Coverage
  • Paid Parental Leave
  • Support for Community Involvement
  • 14 Paid Company Holidays
  • Unlimited Paid Time Off for Exempt Employees
  • 96 Hours of Sick Time and 120 Hours of Vacation for Non-Exempt Employees Accrued Each Year
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service