Staff SOC Analyst driving advanced threat detection and incident response for Sunrun's security team. Leading complex investigations, mentoring analysts, and improving detection capabilities in a remote setup.
Responsibilities
Serve as the senior technical expert within the SOC, providing advanced analysis, guidance, and escalation support for complex security incidents and investigations.
Lead threat detection and monitoring efforts, ensuring high-quality alerting, correlation logic, and continuous tuning of SIEM, EDR, and related security tools.
Participate in incident response operations, coordinating containment, eradication, and recovery actions across teams while maintaining situational awareness and clear communication.
Develop and enhance detection content, including use cases, correlation rules, and analytics to improve visibility and reduce false positives.
Proactively hunt for threats across endpoints, networks, and cloud environments using behavioral analysis and threat intelligence.
Mentor and support SOC analysts, providing technical coaching, procedural guidance, and fostering a culture of continuous learning and operational excellence.
Collaborate with security engineering teams to improve detection capabilities and integrate new data sources and tools.
Oversee SOC processes and workflows, identifying opportunities for automation, optimization, and alignment with best practices such as MITRE ATT&CK.
Analyze and communicate security trends and incident metrics, producing actionable reports and recommendations for leadership and stakeholders.
Contribute to the development of playbooks, SOPs, and response frameworks to standardize SOC operations and improve response maturity.
Participate in red/blue/purple team exercises to validate and enhance detection and response effectiveness.
Stay ahead of emerging threats and technologies, advising on strategic improvements to the organization’s overall security posture.
Requirements
8+ years of experience in security operations, threat detection, or incident response, with at least 2–3 years in a senior or lead SOC role.
Proven track record of managing or serving as a senior escalation point for high-impact security incidents.
Deep understanding of security monitoring tools and technologies, including SIEM (e.g., Splunk, QRadar, Sentinel, Elastic), EDR/XDR, and SOAR platforms.
Strong proficiency in incident response processes, log analysis, network traffic analysis, and endpoint investigation.
Familiarity with cloud security monitoring and detection (AWS, Azure, or GCP).
Experience developing and tuning detection rules, correlation logic, and playbooks to improve SOC efficiency.
Solid understanding of network protocols, operating systems, and common attacker tools and techniques.
Demonstrated ability to lead technical teams, mentor junior analysts, and drive cross-functional collaboration.
Strong analytical, problem-solving, and decision-making skills under pressure.
Excellent written and verbal communication skills, including the ability to brief executives and non-technical stakeholders.
Experience developing SOC metrics, dashboards, and reports to track operational performance and threat trends.
Excellent communication skills, with the ability to present complex findings clearly.
Certifications (preferred): GIAC Certified Incident Handler (GCIH), GIAC Cyber Threat Intelligence (GCTI), Certified Ethical Hacker (CEH), or related certifications.
A bachelor's degree in computer science or equivalent.
Cyber Operations Lead ensuring coordination of cyber operations between the Security Operations Center and internal business units. Enhancing security through effective incident response and threat management initiatives.
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.
SOC Analyst L2 responsible for managing and analyzing security incidents in digital transformation. Contributing directly to the protection of companies and infrastructures.
Senior Manager leading global IT security operations to protect company data and assets at Keenova. Overseeing incident response, monitoring, and cybersecurity capabilities with strategic oversight.
Security Operations Center leader at Woven by Toyota, managing triage and response to security alerts in Japan. Collaborating with global SOCs to ensure 24/7 operations.
GSOC Analyst responsible for security operations at Paramount Studios. Developing workflows, incident response, and risk monitoring in a dynamic team environment.