Submitting more applications increases your chances of landing a job.

Here’s how busy the average job seeker was last month:

Opportunities viewed

Applications submitted

Keep exploring and applying to maximize your chances!

Looking for employers with a proven track record of hiring women?

Click here to explore opportunities now!
We Value Your Feedback

You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for

Would You Be Likely to Participate?

If selected, we will contact you via email with further instructions and details about your participation.

You will receive a $7 payout for answering the survey.


User unblocked successfully
https://bayt.page.link/N39uCLVTNk1faqAD9
Back to the job results

Senior SOC Analyst

30+ days ago 2026/09/03 Expires in 15 days
No experience required
Other Business Support Services
Create a job alert for similar positions
Job alert turned off. You won’t receive updates for this search anymore.

Job description

About the role We are looking for a Senior SOC Analyst to lead advanced security monitoring, investigation, and response across our cloud, endpoint, network, and edge environments.
This role sits at the L2/L3 level and plays a critical part in incident escalation, detection engineering, and strengthening our overall security posture.
You will also act as a mentor to junior analysts and collaborate closely with security, cloud, and engineering teams.
Key responsibilities Perform advanced L2/L3 alert triage and investigations across endpoint, network, cloud, and edge security platforms Lead investigations using SIEM tools to validate incidents, reduce noise, and determine impact Analyze and respond to edge security events including WAF, DDoS, bot activity, and Zero Trust alerts Act as an escalation point for confirmed incidents and support containment and response actions Conduct root cause analysis and threat investigations, identifying attacker behavior and scope of impact Design, tune, and maintain detection rules and logic across SIEM platforms Improve detection coverage by aligning rules with the MITRE ATT&CK framework Mentor and guide junior SOC analysts and contribute to skill development across the team Help build and maintain investigation playbooks and incident response runbooks Collaborate with SOC leadership, Cloud Security, and DevOps teams to improve security controls and visibility What success looks like Security alerts are accurately triaged with reduced false positives and faster response times Incidents are thoroughly investigated with clear root cause analysis and actionable remediation Detection coverage improves continuously across cloud, endpoint, and edge environments Junior analysts demonstrate stronger investigation and escalation capabilities Cross-functional teams are supported with clear, timely security insights and recommendations 5+ years of experience as a SOC Analyst (L2/L3) Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or equivalent experience Hands-on experience with SIEM platforms (Splunk, Graylog, or similar) Experience performing alert triage, incident investigation, and escalation Strong knowledge of networking protocols (TCP/IP, DNS, HTTP/HTTPS, BGP) Experience analyzing AWS security logs (CloudTrail, CloudWatch, VPC Flow Logs) Experience with container and Kubernetes runtime security (Kubernetes, Amazon EKS) Hands-on experience with Cloudflare security tools (WAF, DDoS, Bot Management, Zero Trust) Strong understanding of IDS/IPS, firewalls, proxies, and DLP technologies Experience conducting root cause analysis and post-incident reviews Familiarity with MITRE ATT&CK framework and NIST incident response standards Experience developing and tuning SIEM detection rules Knowledge of scripting or automation (Python, PowerShell, or Bash) Foundational understanding of AI/ML security concepts and LLM-related risks Strong analytical, investigation, and incident handling skills Ability to communicate technical findings to non-technical stakeholders Relevant certifications preferred (GCIA, GCIH, CompTIA CySA+, AWS Security Specialty)

This job post has been translated by AI and may contain minor differences or errors.

Preferred candidate

Years of experience
No experience required
Degree
Bachelor's degree / higher diploma

You’ve reached the maximum limit of 15 job alerts. To create a new alert, please delete an existing one first.
Job alert created for this search. You’ll receive updates when new jobs match.
Are you sure you want to unapply?

You'll no longer be considered for this role and your application will be removed from the employer's inbox.