Senior SOC Analyst - SOCA 25-33120


IT - NY - Brooklyn, NY
Kings County, New York
Locations: Kings County, Long Island City, New York, Newark
Posted On: November 19, 2025
Last Day to Apply: December 03, 2025
Pay: From $75.00 per hour

Job Title: Senior SOC Analyst

Location: Brooklyn, NY
Duration: 18 Months
Schedule: Evening/Night Hours — Thu, Fri & Sat
Hybrid: 2 Days Onsite (Fri & Sat) + 1 Day Remote (Thu)

Job Description (Client Details Removed)

The Senior SOC Analyst will enhance the organization’s cybersecurity posture by monitoring, analyzing, and responding to security threats. This role provides expertise in risk assessment, incident response, and compliance to ensure the confidentiality, integrity, and availability of critical systems. The analyst will work with internal teams to ensure alignment with security best practices, federal regulations, and organizational policies.

Responsibilities

Security Monitoring & Incident Response

  • Monitor, detect, and analyze security events across networks, endpoints, and cloud systems using enterprise SIEM platforms.

  • Conduct deep-dive investigations into security incidents and generate detailed incident reports.

  • Perform triage, containment, eradication, recovery, and reporting of cyber incidents following recognized guidelines (e.g., NIST SP 800-61).

  • Support threat hunting and advanced incident investigation activities.

Threat Intelligence & Risk Analysis

  • Perform threat intelligence analysis and correlate findings to organizational risks.

  • Create situational awareness reports for leadership and technical teams.

  • Identify cybersecurity trends and emerging threats.

Policy, Compliance & Documentation

  • Develop, review, and update cybersecurity policies, procedures, and SOPs.

  • Prepare executive-level briefings on risks, incidents, and program health.

  • Maintain documentation for internal training and audit readiness.

Security Engineering & Collaboration

  • Work with IT, DevOps, and operations teams to implement secure configurations and architecture improvements.

  • Recommend and deploy automation solutions for alerting, log analysis, and response workflows.

  • Participate in cyber exercises, penetration test support, and red-team/blue-team activities.

Mandatory Qualifications

  • 8+ years of cybersecurity experience, with 3+ years in a senior or lead analyst role.

  • Expertise in security operations, incident response, and threat intelligence.

  • Hands-on experience with enterprise SIEM tools (Splunk, Q-Radar, Microsoft Sentinel, Securonix).

  • Experience with EDR platforms (e.g., CrowdStrike, MS Defender).

  • Strong knowledge of:

    • Network & endpoint security

    • Cloud security (AWS, Azure, GCP)

    • Cybersecurity frameworks: NIST CSF, CIS Controls, MITRE ATT&CK

  • Proficiency in cyber forensic analysis and incident handling.

  • Strong written and verbal communication skills, including executive-level briefings.

  • Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience).

Preferred Skills

  • Industry certifications: CISSP, CISM, GCIH, GCIA, GCFA, CEH, or similar.

  • Experience in regulated industries (government, healthcare, finance, utilities).

  • Knowledge of secure SDLC and DevSecOps practices.

  • Familiarity with Zero Trust security models.

  • Advanced scripting (Python, PowerShell, Bash) for automation and log analysis.

  • Experience with SOAR platforms for incident automation and orchestration.

Skip to the main content