Lead triage and investigation of security alerts, escalating and coordinating incident response as needed. Perform root cause analysis, scope affected assets, and drive containment, eradication, and recovery. Correlate events across SIEM, EDR, IDS/IPS, firewalls, cloud logs, and identity platforms to identify true positives and reduce false positives. Develop, refine, and maintain SOC playbooks, runbooks, and detection logic aligned to the MITRE ATT&CK framework. Mentor junior analysts and provide guidance on investigation techniques, documentation standards, and operational best practices. Coordinate with Threat Intelligence to enrich investigations, track adversary TTPs, and proactively hunt for indicators of compromise. Partner with Engineering teams to tune detections, improve log fidelity, and strengthen preventive controls. Create clear, actionable incident reports and executive summaries; contribute to metrics and trend analysis. Support purple team exercises and post-incident reviews to capture lessons learned and drive continuous improvement. Ensure adherence to regulatory and security policies; maintain audit-ready documentation for investigations and incidents.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
No Education Listed