About The Position

We are at the forefront of transforming the future of technology in the financial industry, and we seek curious, practical individuals to help us pave the way. Our team is not intimidated by taking calculated risks, as they relish a good challenge and are eager to engage in problem-solving. As a member of our team, you will work alongside like-minded experts in a culture that is deeply rooted in innovation and progression. Join us to be part of a transformative journey that can shape the industry's future. We are seeking a skilled and experienced SOC Analyst to play a crucial role in monitoring and analyzing our organization's security infrastructure, detecting and responding to potential threats and incidents, and ensuring the overall security of our systems.

Requirements

  • 5+ years of experience working as a SOC Analyst or in a similar role.
  • 3+ years of both knowledge and hands-on experience with NexGen SIEM, M365 Security Suite, Netskope, Proofpoint, Tanium, EDR solutions, and Qualys.
  • 5+ years of experience with incident response procedures and methodologies.
  • 5+ years of experience with specialized tools for analyzing malicious emails, malware, viruses, etc.

Nice To Haves

  • Relevant certifications, such as CISSP, or GCIH are highly desirable.

Responsibilities

  • Continuously monitor and triage security events and alerts across multiple platforms—such as Next-Gen SIEM, Microsoft 365 Defender, AWS native security, and other enterprise security tools—to identify anomalous activity, policy violations, and potential indicators of compromise (IOCs). This includes validating alert fidelity, escalating true positives, suppressing false positives, and maintaining situational awareness across the environment.
  • Perform in‑depth analysis and investigation of security incidents by correlating logs, endpoint telemetry, network traffic, identity activity, and threat intelligence to determine root cause, scope, impact, MITRE ATT&CK technique alignment, and potential business risk. This includes detailed investigation timelines, document evidence, and recommend containment, eradication, and recovery actions.
  • Conduct proactive threat hunting using hypotheses based on emerging threats, adversary TTPs, behavioral analytics, and environmental risk indicators. Leverage SIEM queries, EDR telemetry, cloud audit logs, and threat intel feeds to identify stealthy threats such as lateral movement, persistence mechanisms, privilege misuse, or unauthorized data access.
  • Develop clear, concise, and accurate reports on security incidents, active threats, root cause findings, vulnerabilities, and trending patterns for SOC management, InfoSec leadership, and cross‑functional stakeholders. This includes post‑incident summaries, incident metrics, threat trend analysis, and recommendations to strengthen preventive and detective controls.
  • Collaborate closely with internal technology teams—including Cloud Engineering, Network Security, IAM, DevOps, and Governance/Risk/Compliance—to enhance security policies, improve detection coverage, update response playbooks, refine log source onboarding, and support the continuous maturation of the SOC’s operational processes. Participate in tabletop exercises, control tuning, and strategic security initiatives to improve the organization’s security posture.
  • Adhere to established Security Operations Center service-level agreements (SLAs) for alert triage, investigation, escalation, and incident response to ensure timely risk mitigation and operational efficiency. Additionally, maintain SLA compliance for incident documentation, ticket updates, handoff notes, and closure guidelines aligned with SOC operating procedures and regulatory expectations.
  • Participate in the SOC on‑call rotation to provide after‑hours support for high‑severity security incidents, urgent investigations, and priority escalations. Responsibilities include responding to critical/high alerts within defined SLA timeframes, coordinating with cross‑functional teams during major incidents, and ensuring continuous coverage to maintain 24/7 operational readiness.
  • Participate in other duties as assigned to support overall Security Operations Center efficiency and organizational objectives.

Benefits

  • Inclusive health, dental, vision and life insurance plans built to support diverse lifestyles, offer preventative care, and protect against hardship.
  • Easy access to mental health benefits to meet our team members and their families where they are.
  • 20 plus days of paid time off (PTO), paid holidays, and 2 paid wellness days to give our employees the time they need to stay close with their loved ones, recharge, and give back to their communities.
  • 401(k) Savings plan with a generous company contribution (up to 5%), and access to a financial professional to offer our employees the opportunity to plan-ahead for a strong financial future well beyond their working years.
  • Paid parental leave to support all team members with birth, adoption, and foster.
  • Health Savings and Flexible Spending Account options to help you save money on healthcare, daycare, commuting, and more.
  • Employee Assistance Program (EAP), LifeLock, Pet Insurance and more.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

No Education Listed

Number of Employees

251-500 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service