CrawlJobs Logo

Senior Analyst, Security Operations Center

brightspeed.com Logo

Brightspeed

Location Icon

Location:
United States , Charlotte

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Senior Analyst, Security Operations Center (SOC) is a technical leader responsible for advanced threat detection, incident response, and continuous improvement of Brightspeed’s enterprise security monitoring capabilities. Operating in a 24x7 environment, this role leads complex investigations, coordinates multi-team response efforts, and develops advanced detection and automation capabilities. The Senior Analyst mentors junior analysts, contributes to SOC strategy and roadmap development, and plays a key role in strengthening Brightspeed’s security posture through proactive threat hunting, refined detection logic, and operational excellence.

Job Responsibility:

  • Lead incident response efforts for high-severity and complex security events, serving as the primary technical coordinator during major incidents
  • Act as escalation point for junior analysts, providing technical guidance and decision support in real time
  • Oversee daily SOC operations, including shift management, workload distribution, and quality assurance of investigations
  • Conduct post-incident reviews and facilitate lessons-learned sessions to drive continuous improvement
  • Mentor and train junior analysts to elevate team capabilities and strengthen overall SOC maturity
  • Perform advanced threat analysis, including APT detection, multi-stage attack correlation, and deep analysis of threat actor tactics, techniques, and procedures (TTPs)
  • Lead proactive threat hunting initiatives across cloud, network, identity, and endpoint environments
  • Design and implement advanced detection rules, correlation logic, queries, and dashboards in SIEM and SOAR platforms
  • Develop custom automation playbooks to accelerate investigation, triage, and containment processes
  • Evaluate and recommend enhanced SOC technologies, detection techniques, and analytic capabilities
  • Lead continuous improvement initiatives for SOC processes, workflow automation, detection coverage, and operational efficiency
  • Develop SOC documentation including advanced runbooks, SOPs, and knowledge base articles
  • Contribute to SOC strategic planning, metrics, KPIs, and roadmap initiatives aligned with Security leadership
  • Support transformational projects such as AI-driven detection, automation frameworks, and maturing detection-as-code practices
  • Collaborate closely with Threat Intelligence, Engineering, IT, and Network teams to align detection and response capabilities with enterprise risk priorities
  • Monitor, triage, and analyze security alerts from SIEM, SOAR, EDR/XDR, DLP, CASB, and cloud security tools
  • Provide prescriptive remediation guidance across IT and Network operations teams
  • Document investigations, root cause analyses, and recommendations for prevention and long-term mitigation
  • Participate in a 24x7 on-call rotation, including night shifts as required, for escalated incidents

Requirements:

  • Associate's degree in Computer Science, Information Systems, Engineering, Technology, or related field or equivalent experience/training
  • Experience managing cases/incidents
  • Ability to think analytically
  • Robust creativity and problem-solving skills
  • Knowledge of technical systems and terminology
  • Proficiency in threat management analysis and dissemination
  • Proficiency in scripting languages
  • Advanced written and verbal communication skills

Nice to have:

  • Bachelor's Degree in Computer Science, Information Systems, Engineering, Technology, or related field or equivalent experience/training
  • Information Security Certification (GSEC, Security+, GIAC)
  • Python or PowerShell scripting
  • Azure Sentinel and CrowdStrike experience
  • A solid understanding of networking, cyber security concepts
  • Aptitude in solving problems independently
  • Demonstrated problem-solving skills
  • Sound decision-making ability
  • Must be detail oriented, well organized, thrive in a sense-of-urgency environment, leverage best practices, and most importantly, innovate through any problem with a can-do attitude
  • Strong analytical and time management skills
What we offer:
  • Competitive compensation
  • Comprehensive benefits
  • Medical, dental, vision, and life insurance
  • Employee assistance program
  • 401K plan with company match
  • Voluntary benefits

Additional Information:

Job Posted:
January 05, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Senior Analyst, Security Operations Center

Senior Cybersecurity Analyst, Threat Hunter

Our cybersecurity and information security teams at IDEXX contribute to a more r...
Location
Location
United States , Westbrook, Maine
Salary
Salary:
120000.00 - 140000.00 USD / Year
idexx.com Logo
IDEXX
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6–10 years of experience in cybersecurity roles
  • Minimum of 3 years dedicated specifically to threat hunting or advanced incident response
  • Bachelor’s degree in computer science, Cybersecurity, Information Technology, or a related field
  • Preferred certifications GCIH (GIAC Certified Incident Handler) and CompTIA CySA+ (Cybersecurity Analyst+) certification
  • Proven, hands-on experience using platform for EDR (Endpoint Detection and Response) and threat hunting
  • Expert-level knowledge of PowerShell Scripting, Python and EDR and SIEM query language is preferred
  • Deep understanding of incident response lifecycles, methodologies, and forensic techniques
  • Strong knowledge of networking protocols, operating systems (Windows, Linux, macOS), and common attack vectors
  • Familiarity with scripting languages (e.g., Python, PowerShell) for automation of hunting tasks is a plus
  • Exceptional analytical and problem-solving skills with keen attention to detail
Job Responsibility
Job Responsibility
  • Proactively hunt for indicators of compromise (IOCs) and advanced persistent threats (APTs) across the network, endpoints, and cloud environments using threat intelligence and a hypothesis-driven methodology
  • Conduct in-depth analysis of security events, network traffic, and endpoint data to identify malicious activity and potential breaches
  • Utilize the SIEM and EDR platform extensively, applying expert knowledge of the scripting, SIEM and EDR query language to perform complex searches and data analysis
  • Lead and participate in incident response activities, including containment, eradication, and recovery efforts, serving as a primary escalation point for critical security incidents
  • Develop and refine threat hunting playbooks, procedures, and detection rules to improve the security team’s efficiency and effectiveness
  • Collaborate with the security engineering and security operations center (SOC) teams to integrate new threat intelligence and enhance existing security tools and controls
  • Mentor junior analysts and contribute to the ongoing improvement of the organization's overall security posture
What we offer
What we offer
  • Opportunity for annual cash bonus
  • Health / Dental / Vision Benefits Day-One
  • 5% matching 401k
  • Additional benefits including but not limited to financial support, pet insurance, mental health resources, volunteer paid days off, employee stock program, foundation donation matching
  • Fulltime
Read More
Arrow Right

Protective Intelligence Analyst

The Protective Intelligence Analyst is responsible for monitoring global events,...
Location
Location
United States , Santa Clara
Salary
Salary:
100000.00 USD / Year
aus.com Logo
Allied Universal®
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must possess one of the following: Bachelor’s degree in Security Intelligence, Threat Analysis or related field of study
  • Minimum of seven (7) years of formal civilian or military intelligence analysis experience in which your primary role was as an Intelligence Analyst, supporting the full intelligence cycle.
  • Minimum of five (5) years of civilian or military intelligence analysis experience
  • Fusion Centre/law enforcement/customs/security intelligence/military/commercial intelligence background
  • International experience, cultural awareness and sensitivity
  • Strong research, analysis, and critical thinking skills with expertise in open-source intelligence, social media tools, and assessment techniques to identify and evaluate complex threats
  • Excellent written, oral, and presentation communication abilities, including report writing and briefing senior stakeholders
  • Proficient in Microsoft Office Suite, SharePoint, and other relevant tools for data management and reporting
  • Highly organized, detail-oriented, and capable of managing multiple priorities independently or collaboratively across time zones and compressed timelines
  • Initiative and business acumen with minimal supervision
Job Responsibility
Job Responsibility
  • Manage the “intelligence cycle” through the systematic collection, collation, evaluation, interpretation and analysis of information and process this into timely, accurate, and relevant intelligence
  • Assure quality of intelligence products
  • edit and validate reports prior to dissemination. Evaluate Global Security Operations Center (GSOC) staff basic intelligence work product
  • Assess intel procedures specific to the GSOC
  • develop/update guidance documents and processes to eliminate gaps in intelligence gathering and reporting
  • Responsible for producing intelligence products that will aid in mitigating risk, exposure, and impacts to the client’s corporate critical infrastructure (personnel, facilities and assets, business operations, and reputation), globally.
  • Prepare analyses, assessments, verbal briefs or other products by applying expert judgment and specialized experience in interpreting information and making decisions
  • Produce high-quality threat assessments, security alerts, country risk assessments, multi-media presentations and other relevant security and awareness products for dissemination to relevant audiences across the organization as determined by the Intelligence Analyst under the guidelines provided by Senior Management
  • Take initiative to develop new intelligence products and reporting methods to address emerging vulnerabilities
  • formalize and streamline internal processes
What we offer
What we offer
  • Employee Assistance Program
  • Employee Discount Program
  • Tuition Discount Program
  • Training & Career Development Programs
  • Fulltime
Read More
Arrow Right
New

Security Operation Center (SOC) Cloud Analyst - Assistant Vice President

The Security Operation Center (SOC) Cloud Analyst is an intermediate level posit...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5-8 years of relevant experience
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills
  • Bachelor’s degree/University degree or equivalent experience
Job Responsibility
Job Responsibility
  • Monitor security events and alerts from cloud environments (e.g., AWS, Azure, Google Cloud) using security monitoring tools
  • Assist in the detection and investigation of security incidents in the cloud
  • Work with senior security team members to identify vulnerabilities in cloud systems and infrastructure
  • Assist in the preparation of security reports and documentation for audits and compliance
  • Collaborate with internal teams to implement cloud security best practices and mitigate risks
  • Participate in ongoing training and professional development opportunities in cloud security and cybersecurity
  • Fulltime
Read More
Arrow Right

Acquisition management and planning analyst

The SME-Level Acquisition Management and Planning Analyst performs a variety of ...
Location
Location
United States , El Segundo
Salary
Salary:
120000.00 - 150000.00 USD / Year
tecolote.com Logo
Tecolote Research
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 15 equivalent years of experience performing Acquisition Management and Planning activities in the government (military and/or civil servant), federally funded research and development center, or profit / non-profit government support / development Contractor arena
  • Knowledge of various quantitative techniques used to analyze data, develop models, interpret results and brief senior level DoD leadership
  • Must be able to work independently, as well as with a team, on time-sensitive high visibility tasks
  • Knowledge of DoD budgetary principles and procedures
  • Excellent written and verbal communication skills
  • Strong analytical skills and problem-solving abilities
  • Demonstrated knowledge of acquisition management regulations, practices, policies, and procedures associated with Major Defense Acquisition Programs
  • US citizenship is required
  • Master’s degree in Management, Business, Economics, Finance, Accounting, Mathematics, Engineering, Technology, or Operations Research is required
  • Active DoD Secret Clearance is required
Job Responsibility
Job Responsibility
  • Support the Material Leader with Acquisition Planning for the Missile Warning mission area
  • Interact with a multidisciplinary DoD technical workforce and defense hardware contractors in the accomplishment of their duties
  • Evaluate and support the development of program documentation, which includes acquisition strategies, systems engineering plans, Integrated Master Plans and Contract Data Requirements Lists, for adherence to DoD and Air Force policies and guidance
  • Perform market research and provide acquisition strategy recommendations
  • Advise and assist in organizing and establishing Integrated Product Teams
  • Analyze progress against program plan and schedule
  • Evaluate program plan for compliance with applicable DoD and Air Force policies and guidance
What we offer
What we offer
  • Company Paid Major Medical Insurance for employees and family members
  • Dental Insurance for employees and family members
  • Vision Insurance for employees (employee-paid for family members)
  • Group Life Insurance
  • Accidental Death and Dismemberment Insurance
  • Travel Accident Insurance
  • Long-Term Disability
  • Voluntary Short-Term Disability
  • Supplemental Life Insurance
  • Flexible Spending Account (pre-tax deferrals for health care expenses)
  • Fulltime
Read More
Arrow Right

Senior Acquisition Intelligence Support contractor

MAINSAIL Group is looking for an experienced Intelligence & Cyber Analyst to joi...
Location
Location
United States , Hanscom AFB
Salary
Salary:
Not provided
mainsailgroupinc.com Logo
MAINSAIL Group
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Top Secret/SCI Clearance and U.S. Citizenship required for all applicants
  • Bachelor’s degree and 15 years of experience in intelligence support to acquisition programs
  • Advanced knowledge of DoD, USAF, AFLCMC and private-sector acquisition principles, guidance, Executive Orders, regulations and procedures relevant to intelligence support to major Defense acquisition efforts
  • Knowledge of cyber threats and intelligence tracking and assessments of such threats, as they may impact SAOC mission areas
  • Experience supporting a range of DoD acquisition activities through various stages of the Defense Acquisition cycle
  • Possess the knowledge and mindset to play a key “forward leaning” support role as a senior contractor
  • The ability to effectively communicate in both written and verbal forms on highly technical topics
Job Responsibility
Job Responsibility
  • Contribute to and address specific SAOC program intelligence requirements while assessing the impact of technically advanced threat and security support issues to reduce program and operational risks
  • Work with SAOC Cyber team to assess cyber threats to SAOC mission areas and assist in developing solutions to such threats
  • Team with program offices, product centers, and the Intelligence Community (IC) to provide system engineering and technical analysis level inputs in support of major acquisition decisions
  • Provide acquisition intelligence technical and analytical support as outlined in annual Intel Support Taskings from AFLCMC/IN and external PEO customers
  • Review, tailor and analyze Threat Assessments relevant to the SAOC mission areas
  • Review, tailor and analyze System Threat Analysis Reports (STAR) and Validated On-Line Life-Cycle Threats (VOLTS) to the SAOC mission areas
  • Review, tailor and analyze ISR dependencies and Requirements that will support the SAOC mission areas
  • Review, tailor and analyze cross-program analyses, including external programs that impact SAOC subsystems and capabilities
  • Support technical Adversary Cyber Threat Assessments (ACTA) relevant to the SAOC mission areas
  • Support technical Intelligence supportability analyses for the SAOC mission areas
  • Fulltime
Read More
Arrow Right

Senior Analyst

The Senior Analyst (Briefer) focus is the development, quality control, and deli...
Location
Location
United States , Fort Belvoir
Salary
Salary:
Not provided
chickasaw.com Logo
Chickasaw Nation Industries, Inc (CNI)
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must possess an active Top Secret (TS) security clearance at the time of proposal submission and be able to attain Sensitive Compartmented Information (SCI) access by the issuance of the contract
  • Must be willing to undergo and pass a Counterintelligence Polygraph (CI Poly)
  • Must be a U.S. Citizen
  • Must obtain/retain a government background investigation commensurate with position requirements
  • Must have extensive experience in a Network Operations Center (NOC) environment
  • Possesses a results-focused mindset and superior communication skills (verbal and non-verbal) to effectively interface with military officials and senior leadership
  • Expertise in Microsoft Office and SharePoint to produce high-quality briefings and reports
  • Knowledge of the Military Decision Making Process (MDMP) and Army Intelligence processes
  • Experience as an action officer in an Army tactical, Army strategic, or Joint strategic military intelligence organization
  • Demonstrated experience operating at a Division level or higher
Job Responsibility
Job Responsibility
  • Responsible for developing all briefings, documentation, and reports covering the entire scope of activities for the Transport Network Operations
  • Develops, quality checks, and disseminates the daily Critical System Status Report via email to senior leadership
  • Provides in-person Critical System Status Report briefings to senior leadership daily (currently scheduled for 0730, subject to change)
  • Ensures the Readiness Dashboard or other provided status medium is updated within 30 minutes of any changes to system status or troubleshooting efforts
  • Coordinates all authorized system outages and facilitates effective knowledge sharing between multiple offices and personnel
  • Ensures that 95% of reports are delivered on time and 95% of submitted briefings are error-free
  • Plans daily activities within the guidelines of company policy, job description, and supervisor’s instruction to maximize personal output
  • Responsible for aiding in own self-development by being available and receptive to all training made available by the company
What we offer
What we offer
  • Medical
  • Dental
  • Vision
  • Company Life Insurance
  • Short-Term and Long-Term Disability Insurance
  • 401(K) Immediate Vesting
  • Professional Development Assistance
  • Legal Aid Assistance Program
  • Family Planning / Fertility Assistance
  • Personal Time Off
  • Fulltime
Read More
Arrow Right

Senior Analyst

The Senior Analyst (Briefer) focus is the development, quality control, and deli...
Location
Location
United States , Fort Belvoir
Salary
Salary:
Not provided
chickasaw.com Logo
Chickasaw Nation Industries, Inc (CNI)
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must possess an active Top Secret (TS) security clearance at the time of proposal submission and be able to attain Sensitive Compartmented Information (SCI) access by the issuance of the contract
  • Must be willing to undergo and pass a Counterintelligence Polygraph (CI Poly)
  • Must be a U.S. Citizen
  • Must obtain/retain a government background investigation commensurate with position requirements
  • Must have extensive experience in a Network Operations Center (NOC) environment
  • Possesses a results-focused mindset and superior communication skills (verbal and non-verbal) to effectively interface with military officials and senior leadership
  • Expertise in Microsoft Office and SharePoint to produce high-quality briefings and reports
  • Knowledge of the Military Decision Making Process (MDMP) and Army Intelligence processes
  • Experience as an action officer in an Army tactical, Army strategic, or Joint strategic military intelligence organization
  • Demonstrated experience operating at a Division level or higher
Job Responsibility
Job Responsibility
  • Responsible for developing all briefings, documentation, and reports covering the entire scope of activities for the Transport Network Operations
  • Develops, quality checks, and disseminates the daily Critical System Status Report via email to senior leadership
  • Provides in-person Critical System Status Report briefings to senior leadership daily (currently scheduled for 0730, subject to change)
  • Ensures the Readiness Dashboard or other provided status medium is updated within 30 minutes of any changes to system status or troubleshooting efforts
  • Coordinates all authorized system outages and facilitates effective knowledge sharing between multiple offices and personnel
  • Ensures that 95% of reports are delivered on time and 95% of submitted briefings are error-free
  • Plans daily activities within the guidelines of company policy, job description, and supervisor’s instruction to maximize personal output
  • Responsible for aiding in own self-development by being available and receptive to all training made available by the company
What we offer
What we offer
  • Medical
  • Dental
  • Vision
  • Company Life Insurance
  • Short-Term and Long-Term Disability Insurance
  • 401(K) Immediate Vesting
  • Professional Development Assistance
  • Legal Aid Assistance Program
  • Family Planning / Fertility Assistance
  • Personal Time Off
  • Fulltime
Read More
Arrow Right

Security Officer - GSOC Operator Analyst

As a Security Officer - GSOC Operator in Whitehouse Station, NJ, you will serve ...
Location
Location
United States , Whitehouse Station
Salary
Salary:
22.44 USD / Hour
aus.com Logo
Allied Universal®
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Be at least 18 years of age for unarmed roles
  • 21+ years of age for armed roles
  • Possess a high school diploma or equivalent
  • As a condition of employment, applicants will be subject to a background investigation in accordance with all federal, state, and local laws
  • As a condition of employment, applicants will be subject to a drug screen to the extent permitted by law
  • Licensing requirements are subject to state and/or local laws and regulations and may be required prior to employment
  • A valid driver’s license will be required for driving positions only
Job Responsibility
Job Responsibility
  • Ensure serviceability and accountability of all GSOC equipment and software
  • Extensive knowledge of access control systems, CCTV operation and maintenance of electronic security systems
  • Strong computer skills, including proficiency in the use of internet, open source searches, human intelligence gathering, email, word processing, database programs and specialized software systems
  • Analyst must be flexible and available to work outside normal shift schedule on an as-needed basis
  • Coordinate effort as required to ensure that overall GSSBCM mission is achieved
  • Incident management and appropriate escalation of incidents to senior leadership
  • Responsible for maintaining specific awareness of domestic and international risks
  • Global incident reporting
  • Proactively search all available sources (e.g., GSOC tools, open source internet, physical security systems, etc.) for information and/or events that may impact Chubb employees, facilities, operations, systems, customers, or brand
  • Liaise with partners at all appropriate geographic locations and organizational levels to determine the actual effects of potential threats
What we offer
What we offer
  • Smart Tools: Access to our exclusive technology to view and claim additional shifts to earn more
  • Career Growth: Get paid training and access to career growth opportunities
  • Financial and Health Benefits: Enjoy access to a retirement savings plan, plus medical, dental, vision, basic life and AD&D, and disability insurance
  • Exclusive Perks: Enjoy discounts on top brands and services through our Perks Program
  • Employee Assistance Program
  • Employee Discount Program
  • Tuition Discount Program
  • Training & Career Development Programs
  • Fulltime
Read More
Arrow Right