L3 SOC Analyst – Cyber Threat Intelligence

Reposted 2 Days Ago
Be an Early Applicant
Wilmington, MA, USA
In-Office
128K-175K Annually
Senior level
Artificial Intelligence • Hardware • Automation • Manufacturing
The Role
The SOC Analyst is responsible for leading investigations, mentoring analysts, enhancing detection capabilities, and managing incident responses in a cybersecurity context.
Summary Generated by Built In

About Analog Devices

Analog Devices, Inc. (NASDAQ: ADI ) is a global semiconductor leader that bridges the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive advancements in digitized factories, mobility, and digital healthcare, combat climate change, and reliably connect humans and the world. With revenue of more than $9 billion in FY24 and approximately 24,000 people globally, ADI ensures today's innovators stay Ahead of What's Possible™. Learn more at www.analog.com and on LinkedIn and Twitter (X).

          

L3 SOC Analyst – Cyber Threat Intelligence (CTI) Focus P4

Location: MA, USA - (HYBRID)
Department: Cybersecurity – Security Operations Centre (SOC)
 

About Analog Devices (ADI)

Analog Devices, Inc. (NASDAQ: ADI) is a global semiconductor leader bridging the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive technological advancements in industries like healthcare, automotive, industrial automation, and climate sustainability. With $9B+ in annual revenue and a global workforce of 24,000+, ADI ensures today's innovators stay Ahead of What’s Possible™. Learn more at www.analog.com.

Role Overview

We’re looking for an L3 SOC Analyst with strong Cyber Threat Intelligence (CTI) expertise to elevate our detection and response capabilities. In this role, you’ll drive operational excellence through intelligence‑led threat hunting, advanced investigations, and strategic incident response leadership.  As a player‑coach, you’ll lead complex investigations, mentor analysts, and strengthen our SOC through improvements in detection engineering, CTI integration, and automated response. You’ll work across teams, communicate clearly with both technical and executive stakeholders, and help protect critical business assets through proactive, intelligence‑driven defense. 

Key Responsibilities

  • Lead complex investigations into APTs, ransomware, insider threats, and other advanced adversarial activities affecting the organization.
  • Collect, analyze, and operationalize CTI from OSINT, commercial feeds, ISACs, and internal telemetry to enhance detection and response capabilities.
  • Create and present detailed intelligence assessments and executive briefings for both technical and non-technical audiences.
  • Track and profile threat actor TTPs using frameworks like MITRE ATT&CK to pre-empt emerging risks.
  • Develop and maintain advanced detection logic using SIEM, EDR, and cloud-native tools to ensure comprehensive coverage.
  • Conduct proactive threat hunting to identify and mitigate undetected or emerging threats.
  • Design and implement automated containment workflows, such as device isolation, email purging, and session revocation.
  • Maintain the incident response plan, ransomware decision framework, and other key operational templates.
  • Publish and help manage SOC KPIs/OKRs, such as MTTD/MTTR, false positive rates, and detection coverage metrics.
  • Oversee MSSP/vSOC partners, ensuring maximum value and alignment with detection and response strategies.

Required Qualifications

  • Bachelor’s degree in computer science, Cybersecurity, or a related technical field or equivalent industry experience in a global enterprise.
  • Minimum 5+ years of experience in SOC operations, incident response (IR), cyber threat intelligence (CTI), or detection engineering roles.

Technical Expertise

  • Advanced knowledge of SIEM (preferably Azure Sentinel), EDR/NDR, and cloud security platforms (e.g., Microsoft Defender suite, O365, Azure).
  • Expertise in CTI analysis, including threat actor profiling, malware analysis, and TTP tracking.
  • Proficiency in scripting and automation using Python, PowerShell, or Bash to streamline SOC workflows.
  • Hands-on experience with MITRE ATT&CK, SOAR, and forensic tools for incident response and threat detection.

Preferred Skills

  • Professional certifications such as GCTI, GREM, GCIH, GCIA, CISSP, or CEH.
  • Cloud security certifications (e.g., Azure Security Engineer, AWS Security Specialist).
  • Knowledge of compliance frameworks like PCI-DSS, HIPAA, or GDPR.
  • Experience with vulnerability management platforms (e.g., Tenable, WIZ) and governance frameworks (e.g., SAML, OAuth, CSA).

Why Join Us?

  • Cutting-Edge Technology: Work with state-of-the-art threat intelligence tools, cloud security platforms, and detection technologies.
  • Collaborative Culture: Be part of a forward-thinking SOC team that values collaboration, innovation, and continuous improvement.
  • Professional Growth: Access opportunities for advanced training, certifications, and career development.
  • Competitive Benefits: Enjoy a comprehensive compensation package, including healthcare, retirement plans, and flexible work arrangements.
  • Meaningful Impact: Play a vital role in protecting critical business operations and intellectual property from emerging global threats.

For positions requiring access to technical data, Analog Devices, Inc. may have to obtain export  licensing approval from the U.S. Department of Commerce - Bureau of Industry and Security and/or the U.S. Department of State - Directorate of Defense Trade Controls.  As such, applicants for this position – except US Citizens, US Permanent Residents, and protected individuals as defined by 8 U.S.C. 1324b(a)(3) – may have to go through an export licensing review process.

Analog Devices is an equal opportunity employer. We foster a culture where everyone has an opportunity to succeed regardless of their race, color, religion, age, ancestry, national origin, social or ethnic origin, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, parental status, disability, medical condition, genetic information, military or veteran status, union membership, and political affiliation, or any other legally protected group.

EEO is the Law: Notice of Applicant Rights Under the Law.

Job Req Type: Experienced

          

Required Travel: Yes, 10% of the time

          

Shift Type: 1st Shift/Days

The expected wage range for a new hire into this position is $127,600 to $175,450.
  • Actual wage offered may vary depending on work location, experience, education, training, external market data, internal pay equity, or other bona fide factors.

  • This position qualifies for a discretionary performance-based bonus which is based on personal and company factors.

  • This position includes medical, vision and dental coverage, 401k, paid vacation, holidays, and sick time, and other benefits.

Skills Required

  • Bachelor's degree in computer science, Cybersecurity, or a related technical field or equivalent experience
  • Minimum 5+ years of experience in SOC operations, incident response, cyber threat intelligence, or detection engineering

Analog Devices Compensation & Benefits Highlights

The following summarizes recurring compensation and benefits themes identified from responses generated by popular LLMs to common candidate questions about Analog Devices and has not been reviewed or approved by Analog Devices.

  • Retirement Support The 401(k) program is described as a standout feature, with company contribution up to 8% of base salary and immediate vesting. This structure strengthens long-term value even when cash compensation perceptions vary.
  • Healthcare Strength Health coverage is positioned as comprehensive, including medical, dental, and vision options along with disability and life insurance. Day-one eligibility and multiple plan choices add to perceived robustness.
  • Leave & Time Off Breadth Paid time off appears broad, with vacation ranging from roughly 17–25 days and increasing up to five weeks with tenure, alongside sick time and paid holidays. Parental leave and related time-off provisions further expand coverage.

Analog Devices Insights

Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Wilmington, MA
20,292 Employees
Year Founded: 1965

What We Do

Analog Devices, Inc. (NASDAQ: ADI) operates at the center of the modern digital economy, converting real-world phenomena into actionable insight with its comprehensive suite of analog and mixed signal, power management, radio frequency (RF), and digital and sensor technologies. ADI serves 125,000 customers worldwide with more than 75,000 products in the industrial, communications, automotive, and consumer markets. ADI is headquartered in Wilmington, MA.

Similar Jobs

Zscaler Logo Zscaler

Director, Global CXO Programs

Cloud • Information Technology • Security • Software • Cybersecurity
Easy Apply
Remote or Hybrid
USA
8697 Employees
168K-240K Annually

Adstra Logo Adstra

Demand Generation Lead

AdTech • Big Data • Digital Media • Marketing Tech • Database • Automation
In-Office or Remote
2 Locations
175 Employees

PwC Logo PwC

SAP Technology Gen AI, Manager

Artificial Intelligence • Professional Services • Business Intelligence • Consulting • Cybersecurity • Generative AI
Hybrid
51 Locations
370000 Employees
99K-232K Annually

PwC Logo PwC

Quality Engineer (ERP Automation) Manager

Artificial Intelligence • Professional Services • Business Intelligence • Consulting • Cybersecurity • Generative AI
Hybrid
60 Locations
370000 Employees
99K-232K Annually

Similar Companies Hiring

Amalgamated Sugar Thumbnail
Food • Greentech • Agriculture • Industrial • Manufacturing
Boise, Idaho
768 Employees
Bellagent Thumbnail
Artificial Intelligence • Machine Learning • Business Intelligence • Generative AI
Chicago, IL
20 Employees
Onshore Thumbnail
Artificial Intelligence • Fintech • Software • Financial Services
New York City, NY
100 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account