Senior SOC Analyst responsible for detection, triage, and response operations. Fostering incident handling, detection engineering, and automation within a leading live event solution provider.
Responsibilities
Build and operationalize SOC playbooks and escalation workflows.
Lead alert triage, enrichment, and false-positive suppression.
Author detection requirements; write and tune SIEM rules.
Develop hunt hypotheses; lead hunt programs using advanced telemetry and signals intelligence.
Design detection strategies across the kill chain; drive enterprise detection strategy.
Execute incidents end-to-end: containment/eradication, documentation, and communication.
Conduct post-incident reviews and drive remediation and control improvements.
Encourage industry collaboration; embed resilient detection engineering practices.
Advocate and implement automation-first incident response.
Requirements
Proven experience in a SOC or equivalent detection & response function.
3-5 years in Security Operations, Detection & Response, or Incident Handling (SOC experience required).
Hands-on experience with SIEM (e.g., SecOps, Sentinel, QRadar), EDR (e.g., CrowdStrike, Defender, SentinelOne), and SOAR platforms.
Proficient in authoring detections, rule tuning, enrichment pipelines, and alert routing.
Demonstrated capability in building and executing IR playbooks and containment/eradication plans.
Experience conducting post-incident reviews and RCAs, and delivering corrective action plans to engineering teams.
Scripting skills (Python/PowerShell/Bash) for automation, enrichment, and data wrangling.
Excellent written communication for case documentation and executive-ready incident summaries.
Cyber Operations Lead ensuring coordination of cyber operations between the Security Operations Center and internal business units. Enhancing security through effective incident response and threat management initiatives.
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.
SOC Analyst L2 responsible for managing and analyzing security incidents in digital transformation. Contributing directly to the protection of companies and infrastructures.
Senior Manager leading global IT security operations to protect company data and assets at Keenova. Overseeing incident response, monitoring, and cybersecurity capabilities with strategic oversight.
Security Operations Center leader at Woven by Toyota, managing triage and response to security alerts in Japan. Collaborating with global SOCs to ensure 24/7 operations.
GSOC Analyst responsible for security operations at Paramount Studios. Developing workflows, incident response, and risk monitoring in a dynamic team environment.