About The Position

As a US Lead Security and Operations (SOC) Analyst, you will serve as the bridge between frontline analysts and DART management, helping guide real-time incident response, providing mentorship and quality assurance across shifts, and contributing to process development and strategic improvement. You will lead shift operations, act as an escalation point for complex investigations, and ensure consistent application of incident response processes across global teams.

Requirements

  • 5+ years of experience in a cybersecurity analyst role, with at least 2 years in a lead or senior-level capacity.
  • Proven hands-on experience with SIEM, EDR, NDR, and DFIR toolsets.
  • In-depth understanding of attacker TTPs (MITRE ATT&CK) and strong investigative mindset.
  • Experience responding to incidents in cloud environments (AWS, Azure, GCP).
  • Excellent written and verbal communication skills, especially in cross-functional and high-pressure scenarios.
  • Ability to guide and inspire analysts of varying experience levels.
  • Ability to work 9:00AM-5:00PM EST/CST/PST.

Nice To Haves

  • At least two of the following certifications: GIAC Security Expert (GSE), GIAC Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst (GCIA), CompTIA Cybersecurity Analyst (CySA+), OSCP - Offensive Security Certified Professional, CISSP - Certified Information Systems Security Professional, Microsoft Certified: Cybersecurity Architect Expert, AWS Certified Security, CompTIA Security Plus (Sec +).

Responsibilities

  • Coordinate daily DART shift activities to ensure smooth operations and adequate coverage.
  • Act as an escalation point for high-priority security alerts and investigations.
  • Conduct QA reviews on tickets to ensure accuracy, completeness, and adherence to IR procedures.
  • Lead shift handovers, ensuring continuity and communication across regions.
  • Monitor, query, and triage security alerts using SIEM, EDR, and NDR platforms.
  • Perform in-depth investigations into potential threats, applying TTP-based analysis and leveraging internal tools.
  • Collaborate with business units and technical teams during incident response to gather context and execute containment or remediation.
  • Provide structured documentation and recommendations post-incident.
  • Mentor junior and mid-level analysts during investigations and incident response.
  • Support onboarding and continuous training through documentation, coaching, and hands-on guidance.
  • Help identify tooling or workflow gaps; provide recommendations to the DART Manager for improvements.
  • Contribute to the creation and refinement of playbooks and operational procedures.
  • Assist in tracking key performance indicators (Time to Detect, Time to Resolve, Escalation Ratios, etc.).

Benefits

  • Medical, vision, dental and mental health benefits for you and your family.
  • Free concert tickets, generous paid time off including paid holidays, sick time, and personal days.
  • 401(k) program with company match, stock reimbursement program.
  • New parent programs including caregiver leave and baby bonuses, plus fertility, adoption, foster, or surrogacy support.
  • Career and skill development programs with School of Live, tuition reimbursement, and student loan repayment.
  • Volunteer time off, crowdfunding match.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Senior

Industry

Performing Arts, Spectator Sports, and Related Industries

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service