About The Position

As a Senior Security Operations Center (SOC) Analyst at Zelis, you will be instrumental in investigating and mitigating security incidents across the organization. This role involves hands-on technical work such as digital forensics and incident analysis, guiding teammates through complex issues, and contributing to the enhancement of our detection and response capabilities. A significant portion of this role, approximately 40%, will focus on Data Loss Prevention (DLP) and insider risk initiatives, including incident analysis and process development in these areas. Zelis is a company that embraces AI, and associates are empowered to partner with AI to drive innovation and amplify their impact. We are looking for builders with a growth mindset who act with agility, embrace change, and utilize modern technology to shape smarter solutions.

Requirements

  • Bachelor of Computer Science, Engineering, Information Security, Information Technology, or 4+ years of equivalent experience.
  • 3+ years of enterprise-level incident handling.
  • Ability to partner with enterprise teams within a cybersecurity context, leveraging diverse ideas, experiences, thoughts, and perspectives to improve the organization.
  • Effective oral and written communication skills with experience in cybersecurity technical process documentation.
  • Demonstrated cyber defense and information security passion, including commitment to maintaining technical proficiency.
  • Proven record of thought leadership via innovation and non-traditional solutions.
  • Fundamental understanding of IT Security practices/programs/tooling, with demonstrated examples of driving initiatives forwards.

Nice To Haves

  • Advanced cybersecurity certifications (e.g., GCFA, GCIA, GNFA, GCTI, GREM, GCIH, GCFA, GPEN, OSCP, etc.)
  • Cloud (AWS, Azure, GCP, etc.) certifications
  • Proficiency in scripting and high-level programming languages (Python, PowerShell, bash, etc.)
  • Functional knowledge of SIEM, SOAR, malware sandboxing solutions and related tools

Responsibilities

  • Triage alerts, investigate suspicious activity, lead incident response steps, and coordinate containment and recovery efforts.
  • Ensure logs and security data are gathered correctly, cleaned up, and organized for effective analysis.
  • Examine systems, files, logs, and network data to understand the sequence of events during security incidents.
  • Help newer analysts develop their skills by sharing experience, offering guidance, and conducting training sessions.
  • Assist team members with technical questions, tool usage, investigation methods, and established response workflows.
  • Act as the point person during your shift, managing workload, overseeing investigations, ensuring smooth handoffs, and supporting teammates.
  • Look for opportunities to improve processes, recommend new tools or automations, and refine team operations.
  • Participate in a rotating on-call schedule as required.
  • Perform other tasks required by management as needed.

Benefits

  • 401k plan with employer match
  • Flexible paid time off
  • Holidays
  • Parental leaves
  • Life and disability insurance
  • Health benefits including medical, dental, vision, and prescription drug coverage
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service