1,416 Soc Engineer jobs in the United States

SOC Engineer

02165 CyberArk

Posted 9 days ago

Job Viewed

Tap Again To Close

Job Description

Company Description

About CyberArk :
CyberArk (NASDAQ: CYBR), is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit our CyberArk blogs or follow us on X, LinkedIn or Facebook.

Job Description

Our Global Security Operations Center (SOC) plays a critical role in detecting, investigating, and responding to security incidents worldwide. We are looking for an experienced and passionate SOC Engineer to join our team and help drive the next generation of SOC operations, including the use of AI-driven detection and automation.

What You'll Do
  • Lead and deliver complex projects in Splunk, including ongoing maintenance, optimization, and advanced dashboards.
  • Develop and automate security processes with Python scripting and orchestration frameworks.
  • Design, implement, and fine-tune detection engineering rules for advanced threat visibility.
  • Integrate and leverage AI/ML-based technologies to improve detection accuracy, alert triage, and response.
  • Investigate and respond to security alerts, driving resolution and escalation when required.
  • Actively support and enhance incident response (IR) processes across global teams.
  • Conduct cloud security investigations across AWS, Azure, and other environments.
  • Operate and optimize EDR solutions including advanced query writing.
#LI-JH1

Qualifications
  • 5+ years of experience in a SOC, MDR, or Managed EDR service OR security operations .
  • Proven hands-on expertise with Splunk (or equivalent SIEM tools), including project leadership.
  • Strong background in scripting and automation (Python required).
  • Practical experience in incident response and detection engineering.
  • Solid knowledge of cloud security investigations and monitoring.
  • Hands-on experience with EDR platforms
  • Exposure to AI/ML-based solutions for detection, monitoring, or SOC automation.
  • Strong analytical skills, problem-solving mindset, and ability to succeed in a fast-paced environment.
  • Independent, proactive, and collaborative professional with a passion for excellence.


Additional Information

CyberArk is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.

We are unable to sponsor or take over sponsorship of employment Visa at this time.

The salary range for this position is $82,000 - $120,000/year, plus commissions or discretionary bonus, which will be based on the employee's performance. Base pay may also vary considerably depending on job-related knowledge, skills, and experience. The compensation package includes a wide range of medical, dental, vision, financial, and other benefits.
View Now

SOC Engineer

34208 Bradenton, Florida TAD PGS, Inc.

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

We have an outstanding Contract position for anSOC Engineer. This position is 100% remote.
Pay Rate: $ /hr
**US Citizenship is required.**
**Candidate must possess an active Public Trust.**
This role focuses on engineering SOC data feed solutions, implementing SOAR capabilities, and ensuring feed health through cross-team collaboration. The ideal candidate will have strong cybersecurity expertise, including network security, SIEM, incident response, and threat detection.
They will also serve as the backup SOC Lead, overseeing operations, managing escalations, and providing updates to senior leadership during critical incidents when the primary lead is unavailable.
Job Responsibilities:
+ Microsoft Sentinel Engineering: Maintain and optimize a Microsoft Sentinel SIEM/SOAR solution in alignment with client requirements, industry best practices, and federal compliance mandates.
+ Data Integration: Configure and manage log/data feeds from diverse sources (e.g., Fluent Bit, Windows Events, M365, cloud services, endpoint/security platforms).
+ Parsing & Normalization: Develop and refine log parsing rules using Regex, DCRs, and custom transformations to ensure accurate and usable data in Sentinel.
+ SOAR Development: Engineer automation and orchestration solutions using Microsoft Logic Apps, Azure Functions, and PowerShell/Python scripts to improve SOC efficiency and incident response.
+ Threat Detection Engineering: Build, tune, and optimize analytic rules, UEBA, dashboards, and reports to improve detection and response coverage.
+ Collaboration: Partner with cross-functional teams (network, endpoint, cloud, IT ops) to integrate new data sources and deliver actionable SOC capabilities.
+ Documentation & Knowledge Transfer: Develop and maintain clear documentation of SOC architecture, log source onboarding, and automation playbooks; provide training for SOC analysts on new tools and processes.
+ Advisory & Improvement: Conduct gap analyses of existing SOC capabilities, recommend improvements, and contribute to SOC process maturity.
+ Incident Response Support: Provide Tier 3 support and assist with complex investigations when required.
Basic Hiring Criteria:
+ Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience).
+ 5+ years of progressive cybersecurity/SOC experience (engineering and operations).
+ 2-5 years of experience in network defense, SOC engineering, or cybersecurity operations.
+ Hands-on experience with Microsoft Sentinel, including log onboarding, rule development, and automation.
+ Proficiency with log parsing and normalization (Regex, Fluent Bit, DCRs, KQL).
+ Strong scripting skills in PowerShell and/or Python for automation and data handling.
+ Experience configuring and maintaining data feeds for SOC visibility (cloud, endpoint, network, and on-prem).
+ Familiarity with incident response concepts, threat detection engineering, and SOAR workflows.
+ Excellent written and verbal communication skills with the ability to work across technical and non-technical teams.
Desired Qualifications:
+ Knowledge of federal cybersecurity mandates (M-21-31, NIST Cybersecurity Framework, CISA Incident/Vulnerability Playbooks, BOD 22-01).
+ Experience with Microsoft Logic Apps, Azure Functions, or other SOAR development platforms.
+ Experience with UEBA configuration to enhance anomaly detection.
+ Background in AI/ML frameworks for cyber analytics.
+ Experience building SOC metrics, dashboards, and reporting for operational visibility.
+ Familiarity with M365, Azure security tools, ServiceNow workflows, and CISA CDM tools.
+ Relevant certifications such as CISSP, CISM, Microsoft Security Operations Analyst (SC-200), or Azure Security Engineer (AZ-500).
Benefits offered vary by contract. Depending on your temporary assignment, benefits may include direct deposit, free career counseling services, 401(k), select paid holidays, short-term disability insurance, skills training, employee referral bonus, and affordable medical coverage plan, and DailyPay (in some locations). For a full description of benefits available to you, be sure to talk with your recruiter.
Military connected talent encouraged to apply.
VEVRAA Federal Contractor / Request Priority Protected Veteran Referrals / Equal Opportunity Employer / Veterans / Disabled
To read our Candidate Privacy Information Statement, which explains how we will use your information, please visit Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable:
+ The California Fair Chance Act
+ Los Angeles City Fair Chance Ordinance
+ Los Angeles County Fair Chance Ordinance for Employers
+ San Francisco Fair Chance Ordinance
View Now

L3 SOC Engineer

Farmers Branch, Texas Echo IT Solutions, Inc.

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

We need hands-on experience , PERSON RESOLVING l2/3 tickets NOT guide and mentor.
SOC engineer

  • Security incidents and occurrences are tracked, analysed, and reported.
  • Provide security controls such as IDS/IPS, endpoint security, vulnerability management, and data loss prevention recommendations to the client's security team.
  • With the support of the SOC manager, create new operational rules, processes, and procedures.
  • As an initial point of contact for the SOC team, assist them.
  • Assist with handing out work assignments to the team members.
  • Handling escalated security incidents.
  • Proficiency in SIEM platforms (e.g., Splunk, QRadar, ArcSight, Sentinel).
  • Deep knowledge of security frameworks : MITRE Telecommunication&CK, NIST, CIS, etc.
  • Certifications such as CISSP, GIAC (GCIA, GCIH, GCFA), OSCP, CEH, or similar are highly desirable.
View Now

Tier 2 SOC Engineer

27560 Morrisville, North Carolina Insight Global

Posted 9 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description
We are seeking an experienced Tier 2 SOC Engineer to join our Security Operations Center team. The ideal candidate will provide advanced incident detection, analysis, and response, leveraging a broad set of security tools and platforms. You will play a key role in protecting the organization's information assets, supporting incident investigations, and mentoring Tier 1 analysts.
Key Responsibilities
- Monitor security alerts and events using SIEM and security monitoring tools.
- Analyze and triage escalated security incidents; conduct in-depth investigations.
- Respond to and contain security incidents, ensuring proper escalation when necessary.
- Perform root cause analysis and recommend mitigation strategies.
- Support threat hunting activities and proactive identification of risks.
- Develop and tune correlation rules, alerts, and dashboards.
- Document incidents, investigations, and recommendations in ticketing systems.
- Collaborate with IT, engineering, and business units to ensure security best practices.
- Mentor and assist Tier 1 analysts with complex investigations.
- Serve as a subject matter expert by investigating and presenting intelligence on the latest cyber threats, vulnerabilities, and industry best practices weekly or bi-weekly
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: and Requirements
- 5+ years experience in a Security Operations Center or similar security role.
- Strong analytical and problem-solving skills.
- Proactively identify tasks and take ownership to ensure their completion.
- Demonstrate initiative and the capability to work autonomously with minimal supervision.
- Experience with the following tools/platforms:
- Cloud Security: Wiz, Azure Defender for Cloud, AWS Security Hub, related cloud native security tools
- Vulnerability Management: Tenable
- SIEM & Monitoring: Splunk, Microsoft Sentinel, Amazon CloudWatch, AWS CloudTrail
- EDR & Threat Protection: Microsoft Defender for Cloud, Microsoft Defender for Endpoint, Cisco AMP
- Identity & Access: Microsoft Defender for Identity, Azure Active Directory
- Data Loss Prevention: Code42, O365 DLP
- Familiarity with Microsoft 365 security and Azure security controls.
- Experience with AWS Security tools and controls.
- Knowledge of TCP/IP, network protocols, and common attack vectors.
- Ability to interpret and analyze log data from various sources.
- Understanding of incident response methodologies and frameworks (e.g., NIST, SANS).
- Knowledge of vulnerability management processes and remediation.
- Excellent written and verbal communication skills.
- Ability to work in a fast-paced, 5x8 SOC environment - Experience with scripting (Python) for automation and investigation is a plus.
View Now

MXSIAM SOC Engineer (Unit 42)

95053 Santa Clara, California Palo Alto Networks

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

Our Mission

At Palo Alto Networks® everything starts and ends with our mission:

Being the cybersecurity partner of choice, protecting our digital way of life.

Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we're looking for innovators who are as committed to shaping the future of cybersecurity as we are.

Who We Are

We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values were crowdsourced by employees and are brought to life through each of us everyday - from disruptive innovation and collaboration, to execution. From showing up for each other with integrity to creating an environment where we all feel included.

As a member of our team, you will be shaping the future of cybersecurity. We work fast, value ongoing learning, and we respect each employee as a unique individual. Knowing we all have different needs, our development and personal wellbeing programs are designed to give you choice in how you are supported. This includes our FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few!

Your Career

As a Unit 42 SOC Engineer at Palo Alto Networks (Unit 42) you will create custom detection rules with various security products and create playbooks (automations) for information security use cases.

Working closely with our Unit 42 customer base to achieve their goals of maintaining great security on top of their entire security stack with XSIAM & Unit 42.

Your Impact

  • Develop information security and incident response workflows, procedures and deploy them as Cortex XSIAM correlation rules & playbooks

  • Work with customers worldwide on specific security product use cases, API documentations, playbooks & response options

  • Work with customers to understand their specific workflows to help automate procedures & responses on a large scale.

  • Write custom detection rules on top of various security products in Cortex XSIAM

Your Experience

  • Hands-on experience with as many information security tools such as SIEMs, FWs, EDR, Sandboxes, Vulnerability Management, etc.

  • Incident response and malware analysis experience

  • Software development experience, preferably python.

  • Good understanding of SOC and information security management workflows in enterprise organizations

  • Great communication skills

  • Previous experience with Cortex XSOAR or other SOAR products preferred

  • Previous experience with Cortex XSIAM preferred

The Team

Unit 42 is the global threat intelligence team at Palo Alto Networks. We believe threat intelligence should be shared and available to all within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations.

If you're looking for a career with access to the brightest minds in cybersecurity, you've found it. We have a hunger for researching, hunting out the world's newest threats and sharing them with our industry to make the digital world a safer place.

You will be part of a growing, passionate, and dynamic team with an opportunity to work on challenging and exciting projects - centered on what we believe is one of the most significant mission statements in the world. We also strive to be the most people-centric company ever! That means we're constantly working to make your experience amazing, and you are part of the team breaking boundaries of what the workplace can be!

Compensation Disclosure

The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $ - $ /YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here ( .

Our Commitment

We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.

We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at .

Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.

All your information will be kept confidential according to EEO guidelines.

View Now

MXSIAM SOC Engineer Unit 42

95053 Santa Clara, California Palo Alto Networks

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description

Your Career

As a Unit 42 SOC Engineer at Palo Alto Networks (Unit 42) you will create custom detection rules with various security products and create playbooks (automations) for information security use cases.

Working closely with our Unit 42 customer base to achieve their goals of maintaining great security on top of their entire security stack with XSIAM & Unit 42.

Your Impact

  • Develop information security and incident response workflows, procedures and deploy them as Cortex XSIAM correlation rules & playbooks
  • Work with customers worldwide on specific security product use cases, API documentations, playbooks & response options
  • Work with customers to understand their specific workflows to help automate procedures & responses on a large scale.
  • Write custom detection rules on top of various security products in Cortex XSIAM

Qualifications:
Qualifications

Your Experience

  • Hands-on experience with as many information security tools such as SIEMs, FWs, EDR, Sandboxes, Vulnerability Management, etc.
  • Incident response and malware analysis experience
  • Software development experience, preferably python.
  • Good understanding of SOC and information security management workflows in enterprise organizations
  • Great communication skills
  • Previous experience with Cortex XSOAR or other SOAR products preferred
  • Previous experience with Cortex XSIAM preferred

Additional Information

The Team

Unit 42 is the global threat intelligence team at Palo Alto Networks. We believe threat intelligence should be shared and available to all within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations.

If you’re looking for a career with access to the brightest minds in cybersecurity, you’ve found it. We have a hunger for researching, hunting out the world’s newest threats and sharing them with our industry to make the digital world a safer place.

You will be part of a growing, passionate, and dynamic team with an opportunity to work on challenging and exciting projects — centered on what we believe is one of the most significant mission statements in the world. We also strive to be the most people-centric company ever! That means we’re constantly working to make your experience amazing, and you are part of the team breaking boundaries of what the workplace can be!

Compensation Disclosure

The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $ - $ /YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here.

Our Commitment

We’re problem solvers that take risks and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together.

We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at

Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.

All your information will be kept confidential according to EEO guidelines.

View Now

MXSIAM SOC Engineer (Unit 42)

95054 Santa Clara, California Palo Alto Networks

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**Our Mission**
At Palo Alto Networks® everything starts and ends with our mission:
Being the cybersecurity partner of choice, protecting our digital way of life.
Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we're looking for innovators who are as committed to shaping the future of cybersecurity as we are.
**Who We Are**
We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values were crowdsourced by employees and are brought to life through each of us everyday - from disruptive innovation and collaboration, to execution. From showing up for each other with integrity to creating an environment where we all feel included.
As a member of our team, you will be shaping the future of cybersecurity. We work fast, value ongoing learning, and we respect each employee as a unique individual. Knowing we all have different needs, our development and personal wellbeing programs are designed to give you choice in how you are supported. This includes our FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few!
**Your Career**
As a Unit 42 SOC Engineer at Palo Alto Networks (Unit 42) you will create custom detection rules with various security products and create playbooks (automations) for information security use cases.
Working closely with our Unit 42 customer base to achieve their goals of maintaining great security on top of their entire security stack with XSIAM & Unit 42.
**Your Impact**
+ Develop information security and incident response workflows, procedures and deploy them as Cortex XSIAM correlation rules & playbooks
+ Work with customers worldwide on specific security product use cases, API documentations, playbooks & response options
+ Work with customers to understand their specific workflows to help automate procedures & responses on a large scale.
+ Write custom detection rules on top of various security products in Cortex XSIAM
**Your Experience**
+ Hands-on experience with as many information security tools such as SIEMs, FWs, EDR, Sandboxes, Vulnerability Management, etc.
+ Incident response and malware analysis experience
+ Software development experience, preferably python.
+ Good understanding of SOC and information security management workflows in enterprise organizations
+ Great communication skills
+ Previous experience with Cortex XSOAR or other SOAR products preferred
+ Previous experience with Cortex XSIAM preferred
**The Team**
Unit 42 is the global threat intelligence team at Palo Alto Networks. We believe threat intelligence should be shared and available to all within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations.
If you're looking for a career with access to the brightest minds in cybersecurity, you've found it. We have a hunger for researching, hunting out the world's newest threats and sharing them with our industry to make the digital world a safer place.
You will be part of a growing, passionate, and dynamic team with an opportunity to work on challenging and exciting projects - centered on what we believe is one of the most significant mission statements in the world. We also strive to be the most people-centric company ever! That means we're constantly working to make your experience amazing, and you are part of the team breaking boundaries of what the workplace can be!
**Compensation Disclosure**
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $ - $ /YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here ( .
**Our Commitment**
We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at .
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
View Now
Be The First To Know

About the latest Soc engineer Jobs in United States !

Lead Security Operations Center (SOC) Engineer

94103 Sunnyvale, California $130000 Annually WhatJobs

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly experienced and motivated Lead Security Operations Center (SOC) Engineer to join their fully remote security team. This pivotal role will be responsible for designing, implementing, and optimizing the tools, processes, and workflows that power the SOC. You will lead a team of SOC analysts and engineers, ensuring the efficient and effective detection, analysis, and response to security incidents across the organization's digital infrastructure. The ideal candidate will possess a deep understanding of SIEM technologies, IDS/IPS, endpoint detection and response (EDR) solutions, and threat intelligence platforms. Responsibilities include developing and tuning detection rules, automating security workflows, managing security monitoring tools, and providing technical guidance to the SOC team. You will also be responsible for threat hunting, vulnerability management integration, and contributing to incident response playbooks. This role requires strong analytical, problem-solving, and leadership skills, with a proven ability to work independently and drive continuous improvement in security operations. Excellent communication skills are essential for collaborating with various internal teams and reporting on security posture.

Responsibilities:
  • Lead the design, deployment, and management of Security Information and Event Management (SIEM) systems and other SOC tools.
  • Develop, tune, and optimize security detection rules and alerts to minimize false positives and maximize threat detection efficacy.
  • Automate security monitoring, analysis, and response workflows using scripting and orchestration tools.
  • Oversee the monitoring of network traffic, system logs, and endpoint activity for potential security threats.
  • Conduct advanced threat hunting activities to proactively identify sophisticated and unknown threats.
  • Provide technical leadership and mentoring to SOC analysts and engineers.
  • Develop and maintain incident response playbooks and procedures.
  • Collaborate with incident response teams to ensure swift and effective resolution of security incidents.
  • Manage the lifecycle of security tools, including evaluation, procurement, and integration.
  • Stay current with the latest cyber threats, attack vectors, and security technologies.
Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
  • Minimum of 6 years of experience in Security Operations or a related cybersecurity role, with at least 2 years in a lead or senior engineer capacity.
  • Proven experience designing, implementing, and managing SIEM solutions (e.g., Splunk, QRadar, ELK Stack).
  • Strong understanding of network security principles, TCP/IP, and common attack techniques.
  • Proficiency in scripting languages (e.g., Python, PowerShell) for automation.
  • Experience with EDR solutions, IDS/IPS, firewalls, and other security technologies.
  • Excellent analytical, problem-solving, and critical-thinking skills.
  • Strong leadership, communication, and interpersonal skills.
  • Relevant security certifications (e.g., CISSP, GIAC GCIH, GCIA) are highly desirable.
Apply Now

Senior Security Operations Center (SOC) Engineer

32202 Riverview, Florida $155000 Annually WhatJobs

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a leader in cybersecurity solutions, is seeking a highly experienced Senior Security Operations Center (SOC) Engineer to join their fully remote team. This role is paramount in defending against cyber threats by designing, implementing, and maintaining the advanced security infrastructure that powers our Security Operations Center. You will be instrumental in ensuring the continuous operation, efficiency, and effectiveness of our threat detection and incident response capabilities. The ideal candidate will possess deep technical expertise in SIEM technologies, threat detection tools, endpoint detection and response (EDR) solutions, and network security monitoring. Your responsibilities will include architecting and optimizing SOC workflows, developing custom detection rules and scripts, automating security processes, and managing security tooling. You will also play a key role in threat hunting, incident analysis, and providing guidance to SOC analysts. This position demands strong problem-solving skills, a proactive approach to security, and the ability to work effectively in a fast-paced, high-stakes environment. Experience with cloud security (AWS, Azure, GCP) and scripting languages (e.g., Python, PowerShell) is highly valued. This is an exceptional opportunity to leverage your expertise to build and enhance cutting-edge security operations from anywhere.

Responsibilities:
  • Design, implement, and manage Security Information and Event Management (SIEM) systems and other SOC tools.
  • Develop and tune detection rules, alerts, and correlation logic to identify security incidents.
  • Automate security tasks and workflows using scripting and orchestration tools.
  • Configure and maintain security monitoring solutions, including IDS/IPS, EDR, and network traffic analysis.
  • Lead threat hunting initiatives to proactively identify and mitigate emerging threats.
  • Provide technical guidance and mentorship to SOC analysts.
  • Analyze security incidents, conduct forensic investigations, and recommend remediation actions.
  • Collaborate with incident response teams to ensure timely and effective resolution of security events.
  • Stay current with the latest cybersecurity threats, vulnerabilities, and technologies.
  • Contribute to the continuous improvement of SOC processes, procedures, and capabilities.
Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field; relevant certifications are highly desirable.
  • 7+ years of experience in cybersecurity, with a strong focus on SOC operations and security engineering.
  • Expertise in SIEM platforms (e.g., Splunk, QRadar, LogRhythm) and security analytics.
  • Proficiency in scripting languages such as Python, PowerShell, or Bash for automation.
  • In-depth knowledge of network security principles, protocols, and threat vectors.
  • Experience with EDR, threat intelligence platforms, and vulnerability management tools.
  • Strong understanding of cloud security concepts and best practices (AWS, Azure, GCP).
  • Excellent analytical, problem-solving, and diagnostic skills.
  • Exceptional written and verbal communication skills, with the ability to document technical procedures and incident reports.
  • Relevant certifications such as CISSP, GSEC, GCIA, or CEH are a strong plus.
Apply Now

Lead Security Operations Center (SOC) Engineer

43215 Columbus, Ohio $120000 Annually WhatJobs

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is actively recruiting a dynamic Lead Security Operations Center (SOC) Engineer to manage and enhance their security monitoring and incident response capabilities in Columbus, Ohio, US . This leadership role is pivotal in ensuring the confidentiality, integrity, and availability of the company's digital assets. The Lead Engineer will oversee the daily operations of the SOC, mentor a team of security analysts, and drive continuous improvement in threat detection and response processes. Key responsibilities include: managing and tuning SIEM tools, developing and implementing new detection rules, leading incident investigations, and coordinating response efforts. You will also be responsible for threat hunting, vulnerability assessment, and developing playbooks for various security scenarios. The ideal candidate possesses a Bachelor's degree in Computer Science, Information Security, or a related field, coupled with extensive experience in SOC operations and incident response. Proven expertise in SIEM technologies (e.g., Splunk, QRadar), EDR solutions, network security monitoring, and forensic analysis is required. Strong leadership, communication, and problem-solving skills are essential. Certifications such as CISSP, GIAC, or CCIE Security are highly desirable. This is a challenging and rewarding opportunity to lead a critical security function, protect the organization from evolving cyber threats, and contribute to a culture of robust information security.
Apply Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Soc Engineer Jobs