About this role
SOC Analyst - Cyber Threat Intelligence at Analog Devices focuses on threat intelligence-driven detection and response, leading investigations and enhancing SOC capabilities, with exposure to cloud security platforms and automation.
Key Responsibilities
- Lead complex investigations; Collect and operationalize CTI; Provide executive briefings; Track threat actor TTPs; Develop detection logic and containment workflows
Technical Overview
Advanced SIEM (Azure Sentinel), Defender suites, cloud security, CTI integration, scripting, MITRE ATT&CK, SOAR, threat hunting, and vulnerability management.
Ideal Candidate
The ideal candidate is an L3 SOC Analyst with 5+ years of SOC/CTI experience, expert knowledge of Azure Sentinel and Microsoft Defender, and strong scripting skills. They should be able to lead threat investigations, threat hunting, and coordinate incident response in a manufacturing environment.
Must-Have Skills
5+ years of experience in SOC operationsincident response (IR)CTIor detection engineering rolesAdvanced knowledge of SIEM (Azure Sentinel) and cloud security platformsProficiency in scripting and automation using PythonPowerShellor BashHands-on experience with MITRE ATT&CKSOARand forensic tools
Nice-to-Have Skills
Professional certifications such as GCTIGREMGCIHGCIACISSPor CEHCloud security certifications (Azure Security EngineerAWS Security Specialist)Experience with vulnerability management platforms (TenableWiz) and governance frameworks (SAMLOAuthCSA)
Tools & Platforms
Azure SentinelMicrosoft Defender for EndpointMicrosoft Defender for Office 365AzureMITRE ATT&CKSOARTenableWIZ
Required Skills
Azure SentinelMicrosoft DefenderMITRE ATT&CKSOARPythonPowerShellBashEDR/NDRTenableWiz
Hard Skills
Azure Sentinel (SIEM)Microsoft Defender for EndpointMicrosoft Defender for Office 365AzureMITRE ATT&CKSecurity OrchestrationAutomation and Response (SOAR)EDRNDRPythonPowerShellBashTenableWIZ
Soft Skills
CommunicationTeam leadershipStakeholder managementProblem-solvingOperational excellence
Certifications
Preferred
GIAC Cyber Threat Intelligence (GCTI)GIAC Reverse Engineering Malware (GREM)GIAC Certified Intrusion Analyst (GCIA)GIAC Certified Incident Handler (GCIH)Certified Information Systems Security Professional (CISSP)Certified Ethical Hacker (CEH)
Keywords for Your Resume
L3 SOC AnalystCyber Threat Intelligence (CTI)Azure SentinelMicrosoft Defender for EndpointMicrosoft Defender for Office 365AzureMITRE ATT&CKSOARPythonPowerShellBashEDRNDRTenableWIZGCTIGREMGCIAGCIHCISSPCEHMicrosoft Defender
Deal Breakers
Less than 5 years in SOC/CTI, No experience with Azure Sentinel or Microsoft Defender, Inability to work in hybrid on-site/remote environment
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile