This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Senior SOC Analyst is responsible for detection, triage, and response operations across our enterprise. This role blends hands-on incident handling with detection engineering, playbook development, and response automation efforts. This role delivers on alerts and case management, drives resilient detection strategies, and leads hunt efforts that proactively surface threats before they become incidents.
Job Responsibility:
Build and operationalize SOC playbooks and escalation workflows
Lead alert triage, enrichment, and false-positive suppression
Author detection requirements
write and tune SIEM rules
Develop hunt hypotheses
lead hunt programs using advanced elemetry and signals intelligence
Design detection strategies across the kill chain
drive enterprise detection strategy
Execute incidents end-to-end: containment/eradication, documentation, and communication
Conduct post-incident reviews and drive remediation and control improvements
Encourage industry collaboration
embed resilient detection engineering practices
Advocate and implement automation-first incident response
Requirements:
Proven experience in a SOC or equivalent detection & response function
3-5 years in Security Operations, Detection & Response, or Incident Handling (SOC experience required)
Hands-on experience with SIEM (e.g., SecOps, Sentinel, QRadar), EDR (e.g., CrowdStrike, Defender, SentinelOne), and SOAR platforms
Proficient in authoring detections, rule tuning, enrichment pipelines, and alert routing
Demonstrated capability in building and executing IR playbooks and containment/eradication plans
Experience conducting post-incident reviews and RCAs, and delivering corrective action plans to engineering teams
Scripting skills (Python/PowerShell/Bash) for automation, enrichment, and data wrangling
Excellent written communication for case documentation and executive-ready incident summaries
Nice to have:
Turns noisy telemetry into actionable signals
Is detail-oriented and disciplined in organizing information
Ships repeatable playbooks, maintains clean runbooks, and closes feedback loops
Ready to mentor other analysts, set standards for communication and delivery for the SOC
Comfortable presenting complex technical information to the CISO or other executive leadership