Our Cyber Security Operations Center (CSOC) team is the frontline of defense, responsible for protecting the organization from evolving cyber threats with precision, urgency, and purpose. We’re a mission-driven team that thrives in a high-tempo environment—where curiosity, accountability, and continuous improvement are at the core of everything we do.
We operate a 24/7 global detection and response program, leveraging cutting-edge tools, advanced threat intelligence, and automation to detect, investigate, and respond to threats at scale. But more than the tech, it's our people that make the difference. We’re collaborative, detail-oriented, and deeply committed to safeguarding the business while enabling innovation.
As part of our team, you’ll not only work on meaningful challenges—you’ll shape how Security Operations evolves. From driving detection engineering efforts to mentoring analysts and influencing process improvements, this is where tactical excellence meets strategic impact.
In order to enhance collaboration and cross-functional partnerships, among other things, at this time, our organization follows a hybrid work schedule that requires employees to work in the office 3 days a week, or as directed by their manager/department. We regularly review our hybrid work model, and the specific requirements may change at any time.
Tasks and Responsibilities:
- As a Lead SOC Analyst, you’ll play a critical role at the intersection of frontline detection, incident response, and strategic defense engineering. This isn’t a passive monitoring role—you’ll be empowered to lead investigations, shape detection logic, and elevate the SOC’s analytical and operational rigor.
- Lead high-fidelity investigations from triage to root cause, coordinating incident response efforts across threat surfaces including endpoint, cloud, identity, and SaaS.
- Mentor and develop SOC analysts, raising the technical bar through case reviews, scenario-based training, and real-time guidance during critical events.
Report job