Onsite Senior SOC Analyst

Posted 5 days ago

Apply now

About the role

  • Senior SOC Analyst at RSM leading high-severity investigations and guiding SOC's technical direction. Engaging with diverse client organizations in a managed security services environment.

Responsibilities

  • Lead complex, high-severity investigations across endpoint, network, cloud, and identity telemetry.
  • Perform root cause analysis and reconstruct incident timelines using aligned MITRE ATT&CK mapping.
  • Serve as the primary technical liaison during escalated incidents, delivering clear findings and remediation steps to internal leadership and clients.
  • Drive the creation of After-Action Reports (AARs) and lessons learned to improve tooling, detections, and workflow performance.
  • Identify detection gaps and collaborate with Detection Engineering to develop, refine, and tune detection content across relevant telemetry sources.
  • Validate new detections before SOC deployment and provide measurable feedback based on production telemetry.
  • Leverage SOAR platforms to automate enrichment, triage, and response actions.
  • Identify repetitive patterns ideal for automation and propose workflow enhancements to reduce MTTR.
  • Validate automation logic prior to production rollout and ensure alignment with SOC escalation policies.
  • Support hypothesis-driven and intelligence-led hunts by validating findings, artifacts, and suspicious patterns.
  • Mentor junior analysts on investigation techniques, tooling proficiency, case documentation, and proper analytical depth.
  • Produce clear, concise, and accurate technical reports, incident summaries, and executive-friendly communications.

Requirements

  • 5+ years in SOC / detection engineering / threat hunting / incident response (or equivalent depth)
  • Demonstrated experience leading complex investigations and communicating findings to both technical and non-technical stakeholders
  • Hands-on SIEM/EDR/XDR investigation experience and comfort writing or tuning detections (KQL/SPL/Sigma or similar)
  • Strong working knowledge of incident response lifecycle and evidence-driven root cause analysis
  • Certifications such as GCIH, GCFA, GCDA, or similar preferred.
  • Experience with Elastic, Splunk, or other search-based platforms preferred.
  • Knowledge of the MITRE ATT&CK framework preferred.
  • Exposure to scripting languages for automation and enrichment preferred.

Benefits

  • competitive benefits and compensation package
  • flexibility in your schedule

Job title

Senior SOC Analyst

Job type

Experience level

Senior

Salary

$95,400 - $192,000 per year

Degree requirement

Bachelor's Degree

Tech skills

Location requirements

Report this job

See something inaccurate? Let us know and we'll update the listing.

Report job