Primary Duties:
- Engineer and implement security solutions that enhance the SOC’s ability to prevent, detect, and respond to security incidents across cloud environments (AWS, GCP and Azure).
- Lead the design, deployment, and maintenance of security monitoring infrastructure, including SIEM, IDS/IPS, EDR, and firewalls.
- Develop and maintain detailed incident response playbooks and procedures, ensuring alignment with industry best practices.
- Provide expert analysis of security events, correlating data from various sources (network, endpoint, application) to gain a holistic view of potential threats.
- Assist in containment and remediation strategies for cyber incidents, coordinating with internal teams to ensure swift resolution.
- Mentor and provide guidance to junior SOC engineers and analysts, helping them develop their technical skills and grow in their roles.
Minimum Qualifications:
- Bachelor’s degree in Computer Science, Information Security, or related field.
- Minimum of 7+ years of hands-on experience in cybersecurity, with a strong focus on SOC engineering, threat detection, and incident response.
- Expertise in managing and optimizing SIEM platforms (e.g.,Sumo Logic), EDR tools, IDS/IPS, and firewalls.
- Hands-on experience in threat intelligence, threat hunting, and advanced log analysis for incident detection and response.
- Understanding of security frameworks and methodologies, such as MITRE ATT&CK, NIST, ISO 27001, or CIS Controls.
- Familiarity with cloud security tools and techniques for monitoring and securing workloads in AWS, Azure, or GCP environments.
Preferred Knowledge, Skills, and/or Abilities:
- Strongly Preferred:
- In-depth knowledge of security operations, including SIEM, EDR, IDS/IPS, malware analysis, and vulnerability management tools.
- Experience working with cloud security technologies (AWS, Azure, GCP), including monitoring, logging, and incident response in cloud environments.
- Experience in developing and deploying automation scripts (e.g., Python, PowerShell) to perform routine tasks such as log analysis, threat detection, and incident response.
- Act as the technical lead in investigating, analyzing, and responding to complex security incidents and remediation efforts.
- Experience in evaluating new security technologies and making recommendations to enhance the organization’s defensive capabilities.
- Hands-on experience in malware analysis, reverse engineering, and digital forensics.
- Experience in advanced log and network traffic analysis to identify security incidents, trends, and anomalous behaviors.
- Preferred:
- Certifications such as CISSP, GCIH, GCIA, CEH, OSCP, or GIAC are preferred.
Similar Jobs
What We Do
Aledade is the largest network of independent primary care, enabling clinicians to deliver better patient outcomes and generate more savings revenue through value-based care. Aledade’s data, personal coaching, user-friendly workflows, health care policy expertise, strong payer relationships and integrated care solutions enable primary care organizations to succeed financially by keeping people healthy. Together with more than 1,900 practices and community health centers in 45 states and the District of Columbia, Aledade manages accountable care organizations that share in the risk and reward across more than 200 value-based contracts representing more than 2.5 million patient lives. To learn more, visit www.aledade.com or follow on X (Twitter), Facebook or LinkedIn.
Why Work With Us
At Aledade, we’re all about doing good for patients, practices and society - which is why we’re so passionate about value-based care and the work we do every day. Because we’re working to benefit all of society, we believe the best way to do so is to utilize all of our team members and their unique experiences, interests, backgrounds and beliefs.
Gallery






