Senior SOC Analyst

Sorry, this job was removed at 10:06 p.m. (CST) on Wednesday, Jan 28, 2026
Hiring Remotely in United States
Remote
Information Technology • Security
The Role

Cyber Advisors (CA) is a rapidly growing Cybersecurity Consulting firm and MSP. We are seeking a Senior SOC Analyst for our Defensive Security team, to support our accelerating company growth and the equally important growth of one’s own career. CA believes in inclusion and is dedicated to continued employee development. We offer a competitive salary and benefits and want candidates who focus on innovation and results. Successful CA employees are detail oriented and have excellent communication skills. The successful candidate will be a creative problem-solver with the ability to structure and order assignments efficiently. Candidates should apply to become part of a forward-thinking team that values your contributions and well-being

SUMMARY
The Senior SOC Analyst is a technical lead responsible for advanced investigations, incident coordination, and continuous improvement of documentation and detection and response capabilities. This role leads escalations, complex cases end-to-end, mentors junior analysts, and partners with engineering and stakeholders to reduce risk across endpoint, network, identity, and cloud environments.
KEY RESPONSIBILITIES

  • Lead deep-dive investigations across SIEM/EDR, cloud, and network telemetry; build timelines and determine scope and impact. 
  • Perform advanced analysis of endpoint activity, authentication/identity events, email telemetry, and network artifacts to identify attacker TTPs.
  • Drive case direction by forming and testing hypotheses; identify containment and remediation actions with clear rationale.
  • Provide clear, actionable technical updates and risk-based recommendations to technical and nontechnical audiences.
  • Conduct root cause analysis and contribute to post-incident reviews; ensure corrective actions and detection improvements are tracked to completion.
  • Develop and maintain detection content (KQL/SPL/Sigma) and associated response playbooks; validate efficacy through testing and tuning.
  • Perform proactive threat hunting using known IOCs, behavioral analytics, and threat intelligence; document hunt hypotheses and outcomes. 
  • Design or request SOAR/automation improvements to reduce time-to-triage and improve consistency (enrichment, containment workflows, reporting). 
  • Mentor and coach SOC Analysts; provide structured feedback on investigations, ticket quality, and incident handling. 
  • Establish and reinforce documentation standards, severity classification consistency, and investigation methodologies. 
  • Deliver high-quality incident reports including executive summaries, technical details, and prioritized remediation recommendations (as assigned).

WORK SCHEDULE AND ENVIROMENT 

  • SOC operations may include evenings, nights, weekends, and holidays depending on coverage needs. 
  • Participation in an on-call rotation may be required, including serving as an escalation point for major incidents. 
  • This role requires calm leadership during high-stress events and the ability to manage multiple parallel investigations.

REQUIRED QUALIFICATION

  • 3–6+ years of experience in security operations, incident response, threat detection, or threat analysis. 
  • Demonstrated experience leading complex investigations and coordinating incident response across technical teams. 
  • Strong proficiency with SIEM and EDR platforms; experience writing detection logic and running advanced queries (KQL/SPL/Sigma).
  • Strong knowledge of adversary behaviors and frameworks (MITRE ATT&CK) and incident handling practices (NIST concepts). 
  • Experience with cloud and identity security telemetry (Microsoft 365, Azure/AWS, Entra ID/Azure AD) and modern endpoint telemetry.
  • Excellent written and verbal communication skills; ability to brief technical and non-technical stakeholders. 
  • Relevant certifications (one or more): CySA+, GCIH, GCIA, ECIH (or equivalent). • Bachelor’s degree in a related field or equivalent practical experience.

PREFERRED QUALIFICATIONS

  • Experience with SOAR platforms and building automation workflows.
  • Experience with DFIR tooling and evidence handling for endpoint and cloud investigations.
  • Advanced certifications (as applicable): GCED, CISSP, CTIA, or vendor-specific security operations certifications.
  • Experience supporting regulated environments and communicating control impacts (HIPAA, PCI-DSS, CJIS, etc.).
  • Experience partnering with detection engineering, purple team, or threat intel functions.

CORE COMPETENCIES 

  • Technical leadership and ownership mindset • Structured investigation methodology and strong attention to detail 
  • Operational excellence: prioritization, documentation standards, and follow-through 
  • Stakeholder communication and customer empathy

WHAT WE OFFER

  • Competitive compensation and performance-based incentives.
  • Vacation and PTO
  • Employer-paid Health and Dental Insurance for CA employees.
  • 401k with employer matching
  • Opportunities for professional development, including certifications and ongoing training.
  • Engaging, dynamic work on a wide range of client security challenges.

Similar Jobs

Remote
2 Locations
17843 Employees
105K-140K Annually

Atlassian Logo Atlassian

Data Analyst

Cloud • Information Technology • Productivity • Security • Software • App development • Automation
In-Office or Remote
Salt Lake City, UT, USA
11000 Employees
106K-167K Annually

Atlassian Logo Atlassian

Solutions Engineer

Cloud • Information Technology • Productivity • Security • Software • App development • Automation
In-Office or Remote
Salt Lake City, UT, USA
11000 Employees
114K-180K Annually

Atlassian Logo Atlassian

Solutions Engineer

Cloud • Information Technology • Productivity • Security • Software • App development • Automation
In-Office or Remote
Salt Lake City, UT, USA
11000 Employees
140K-220K Annually
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Maple Grove, MN
81 Employees
Year Founded: 1997

What We Do

Cyber Advisors (CAI) is a privately held IT solution provider based in Maple Grove, MN, a northwestern suburb of Minneapolis. Since our start, back in 1997, CAI has grown from offering hardware, software and services to pushing the envelope on today's leading technologies for companies and agencies around the U.S. with a focus on network infrastructure.

Incorporated in 2001 by Shane Vinup and Igor Bogachev, Cyber Advisors began its mission to provide right-sized solutions that reduce & mitigate network-related downtime (thereby maximizing employee productivity), ensure data security & availability, and enable your organization to contain IT-related costs. Whether you partner with Cyber Advisors for full managed services, staff augmentation, project-based engineering expertise, or hardware/software purchasing, you gain a trusted partner that recommends solutions specifically tailored to your business objectives.

Whether you’re at the highest level of technical expertise or only know how to browse the Internet and use Microsoft Office, we ensure that you understand the solution being recommended from start to finish. That’s our promise.

Similar Companies Hiring

Credal.ai Thumbnail
Software • Security • Productivity • Machine Learning • Artificial Intelligence
Brooklyn, NY
Standard Template Labs Thumbnail
Software • Information Technology • Artificial Intelligence
New York, NY
15 Employees
Milestone Systems Thumbnail
Software • Security • Other • Big Data Analytics • Artificial Intelligence • Analytics
Lake Oswego, OR
1500 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account