Senior SOC Analyst

Sargent & LundyChicago, IL
2d$100,010 - $144,190Hybrid

About The Position

Sargent & Lundy is a leading consulting engineering firm specializing in the power and energy sectors. Since 1891, we have provided comprehensive engineering, design, and consulting services for both traditional and renewable power generation, grid modernization, nuclear power, and beyond. Our mission is to help clients achieve their energy goals effectively by leveraging advanced technologies and adopting sustainable practices. Role Overview The Senior Information Security Analyst - Security Operations acts as the technical and process subject matter expert on the Security Operations team. This is a "player-coach" role designed for a high-level individual contributor who possesses deep technical expertise in Security Events and Information Management (SIEM), Security Operations (SOC) Management, incident response and Vulnerabilities Management, while also providing technical leadership and mentorship to junior analysts and interns. The successful candidate will bridge the gap between high-level strategy and hands-on execution, ensuring our outsourced SOC vendor delivers high-quality results. You will design, maintain, and interpret KPI/KRI dashboards that track SOC performance, vulnerability risk, incident trends, and control effectiveness, providing executive-ready reporting that drives accountability and informs leadership decisions.

Requirements

  • Education: Bachelor’s degree in computer science, information systems, or related field; or equivalent professional experience.
  • Professional Experience: 5+ years of experience in relevant areas within the Information Security domains.
  • Information Security Standards / Frameworks: Strong understanding of ISO 27001, SOC 2, NIST CSF and CMMC.
  • Tooling Expertise: Advanced proficiency with Qualys, SIEM platforms, DLP tool, understanding of technical details within the security events, CrowdStrike, Palo Alto Cortex XSIAM, Microsoft Defender, or similar tools
  • Metrics, Data Analysis & Management Reporting : Strong focus on data analysis, dashboarding, KPIs/KRIs, and executive-ready reporting.
  • SIEM Knowledge: Deep understanding of SIEM logic and log analysis (e.g., Splunk, Sentinel, or other relevant experience).
  • Cloud Fluency: Experience managing security operations within cloud environments (Azure, or AWS).
  • Networking: Strong understanding of TCP/IP, DNS, WAF, and ZTNA concepts.

Nice To Haves

  • CISSP (Certified Information Systems Security Professional)
  • CISM (Certified Information Security Manager)
  • GCIH (GIAC Certified Incident Handler)
  • Or any other relevant industry recognized certification

Responsibilities

  • Vulnerability & Threat Management
  • SIEM/SOC Management & Coordination
  • Incident Management & Response
  • Drive data analysis, dashboards, and executive reporting
  • Security Resiliency & Continuity
  • Mentorship & Technical Leadership

Benefits

  • Health Plans: Medical, Dental, Vision
  • Life & Accident Insurance
  • Disability Coverage
  • Employee Assistance Program (EAP)
  • Back-Up Daycare
  • FSA & HSA
  • 401(k)
  • Pre-Tax Commuter Account
  • Merit Scholarship Program
  • Employee Discount Program
  • Corporate Charitable Giving Program
  • Tuition Assistance
  • First Professional Licensure Bonus
  • Employee Referral Bonus
  • Paid Annual Personal/Sick Time (PST)
  • Paid Vacation
  • Paid Holidays
  • Paid Parental Leave
  • Paid Bereavement Leave
  • Flexible Work Arrangements
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service