Senior Security Operations Center (SOC) Analyst

ZelisMorristown, TN
Hybrid

About The Position

As a Senior Security Operations Center (SOC) Analyst, you’ll take the lead on investigating and mitigating security incidents across the organization. You’ll dig into digital evidence, guide teammates through complex problems, and help strengthen our overall detection and response capabilities. In this role, you’ll handle hands-on technical work like forensics and incident analysis, while also supporting the team by sharing knowledge, improving processes, and helping shape how we respond to threats. Additionally, 40% of this role will be focused around DLP and insider risk initiatives, which include incident analysis and process building in this space.

Requirements

  • Bachelor of Computer Science, Engineering, Information Security, Information Technology, or 4+ years of equivalent experience.
  • 3+ years of enterprise level incident handling
  • Ability to partner with enterprise teams within a cybersecurity context, leveraging diverse ideas, experiences, thoughts, and perspectives to improve the organization.
  • Effective oral and written communication skills with experience in cybersecurity technical process documentation.
  • Demonstrated cyber defense and information security passion, including commitment to maintaining technical proficiency
  • Proven record of thought leadership via innovation and non-traditional solutions
  • Fundamental understanding of IT Security practices/programs/tooling, with demonstrated examples of driving initiatives forwards.

Nice To Haves

  • Advanced cybersecurity certifications (e.g., GCFA, GCIA, GNFA, GCTI, GREM, GCIH, GCFA, GPEN, OSCP, etc.)
  • Cloud (AWS, Azure, GCP, etc.) certifications
  • Proficiency in scripting and high-level programming languages (Python, PowerShell, bash, etc.)
  • Functional knowledge of SIEM, SOAR, malware sandboxing solutions and related tools

Responsibilities

  • Incident Analysis & Handling: Triage alerts, investigate suspicious activity, lead incident response steps, and coordinate containment and recovery efforts.
  • Data Collection & Normalization: Make sure logs and security data are gathered correctly, cleaned up, and organized so the team can analyze them effectively.
  • Digital Forensics: Examine systems, files, logs, and network data to understand what happened during security events.
  • Mentoring & Training: Help newer analysts grow by sharing your experience, offering guidance, and running training sessions when needed.
  • Technical / Process Guidance: Assist team members with technical questions, tool usage, investigation methods, and established response workflows.
  • Shift Leadership: Act as the point person during your shift: manage workload, oversee investigations, ensure smooth handoffs, and support teammates. Participate in a rotating on-call schedule as required.
  • Innovation: Look for opportunities to improve processes, recommend new tools or automations, and help refine how the team operates.

Benefits

  • 401k plan with employer match
  • flexible paid time off
  • holidays
  • parental leaves
  • life and disability insurance
  • health benefits including medical, dental, vision, and prescription drug coverage
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service