Location: Brooklyn, NY
Duration: 18 Months
Schedule: Evening/Night Hours — Thu, Fri & Sat
Hybrid: 2 Days Onsite (Fri & Sat) + 1 Day Remote (Thu)
The Senior SOC Analyst will enhance the organization’s cybersecurity posture by monitoring, analyzing, and responding to security threats. This role provides expertise in risk assessment, incident response, and compliance to ensure the confidentiality, integrity, and availability of critical systems. The analyst will work with internal teams to ensure alignment with security best practices, federal regulations, and organizational policies.
Monitor, detect, and analyze security events across networks, endpoints, and cloud systems using enterprise SIEM platforms.
Conduct deep-dive investigations into security incidents and generate detailed incident reports.
Perform triage, containment, eradication, recovery, and reporting of cyber incidents following recognized guidelines (e.g., NIST SP 800-61).
Support threat hunting and advanced incident investigation activities.
Perform threat intelligence analysis and correlate findings to organizational risks.
Create situational awareness reports for leadership and technical teams.
Identify cybersecurity trends and emerging threats.
Develop, review, and update cybersecurity policies, procedures, and SOPs.
Prepare executive-level briefings on risks, incidents, and program health.
Maintain documentation for internal training and audit readiness.
Work with IT, DevOps, and operations teams to implement secure configurations and architecture improvements.
Recommend and deploy automation solutions for alerting, log analysis, and response workflows.
Participate in cyber exercises, penetration test support, and red-team/blue-team activities.
8+ years of cybersecurity experience, with 3+ years in a senior or lead analyst role.
Expertise in security operations, incident response, and threat intelligence.
Hands-on experience with enterprise SIEM tools (Splunk, Q-Radar, Microsoft Sentinel, Securonix).
Experience with EDR platforms (e.g., CrowdStrike, MS Defender).
Strong knowledge of:
Network & endpoint security
Cloud security (AWS, Azure, GCP)
Cybersecurity frameworks: NIST CSF, CIS Controls, MITRE ATT&CK
Proficiency in cyber forensic analysis and incident handling.
Strong written and verbal communication skills, including executive-level briefings.
Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience).
Industry certifications: CISSP, CISM, GCIH, GCIA, GCFA, CEH, or similar.
Experience in regulated industries (government, healthcare, finance, utilities).
Knowledge of secure SDLC and DevSecOps practices.
Familiarity with Zero Trust security models.
Advanced scripting (Python, PowerShell, Bash) for automation and log analysis.
Experience with SOAR platforms for incident automation and orchestration.