✦ Luna Orbit — Cybersecurity

Global HRIS Workday Security Specialist

at Goodyear Tire & Rubber

📍 2 Locations Hybrid Posted March 29, 2026
Type Not Specified
Experience senior
Exp. Years 5+ years
Education Bachelor's degree in computer science, Cybersecurity, or related technical field or equivalent industry experience
Category Cybersecurity

SOC Analyst - Cyber Threat Intelligence at Analog Devices focuses on threat intelligence-driven detection and response, leading investigations and enhancing SOC capabilities, with exposure to cloud security platforms and automation.

  • Lead complex investigations; Collect and operationalize CTI; Provide executive briefings; Track threat actor TTPs; Develop detection logic and containment workflows

Advanced SIEM (Azure Sentinel), Defender suites, cloud security, CTI integration, scripting, MITRE ATT&CK, SOAR, threat hunting, and vulnerability management.

The ideal candidate is an L3 SOC Analyst with 5+ years of SOC/CTI experience, expert knowledge of Azure Sentinel and Microsoft Defender, and strong scripting skills. They should be able to lead threat investigations, threat hunting, and coordinate incident response in a manufacturing environment.

5+ years of experience in SOC operationsincident response (IR)CTIor detection engineering rolesAdvanced knowledge of SIEM (Azure Sentinel) and cloud security platformsProficiency in scripting and automation using PythonPowerShellor BashHands-on experience with MITRE ATT&CKSOARand forensic tools
Professional certifications such as GCTIGREMGCIHGCIACISSPor CEHCloud security certifications (Azure Security EngineerAWS Security Specialist)Experience with vulnerability management platforms (TenableWiz) and governance frameworks (SAMLOAuthCSA)
Azure SentinelMicrosoft Defender for EndpointMicrosoft Defender for Office 365AzureMITRE ATT&CKSOARTenableWIZ
Azure SentinelMicrosoft DefenderMITRE ATT&CKSOARPythonPowerShellBashEDR/NDRTenableWiz
Azure Sentinel (SIEM)Microsoft Defender for EndpointMicrosoft Defender for Office 365AzureMITRE ATT&CKSecurity OrchestrationAutomation and Response (SOAR)EDRNDRPythonPowerShellBashTenableWIZ
CommunicationTeam leadershipStakeholder managementProblem-solvingOperational excellence

Preferred

GIAC Cyber Threat Intelligence (GCTI)GIAC Reverse Engineering Malware (GREM)GIAC Certified Intrusion Analyst (GCIA)GIAC Certified Incident Handler (GCIH)Certified Information Systems Security Professional (CISSP)Certified Ethical Hacker (CEH)
Industry Manufacturing
Job Function Senior SOC Analyst focused on CTI-driven detection and incident response
Role Subtype SOC Analyst L3
Tech Domains Security Information and Event Management, Microsoft Defender, Azure, Cloud security, MITRE ATT&CK, Scripting
L3 SOC AnalystCyber Threat Intelligence (CTI)Azure SentinelMicrosoft Defender for EndpointMicrosoft Defender for Office 365AzureMITRE ATT&CKSOARPythonPowerShellBashEDRNDRTenableWIZGCTIGREMGCIAGCIHCISSPCEHMicrosoft Defender

Less than 5 years in SOC/CTI, No experience with Azure Sentinel or Microsoft Defender, Inability to work in hybrid on-site/remote environment

Apply for this Position →

Get matched to jobs like this

Luna finds roles that fit your skills and career goals — no endless scrolling required.

Create a Free Profile