✦ Luna Orbit — Cybersecurity

Untitled Position

at Company

Onsite Posted March 29, 2026
Type Full-Time
Experience senior
Exp. Years 5+ years
Education Bachelor's degree in computer science, Cybersecurity, or a related technical field or equivalent industry experience
Category Cybersecurity

Senior SOC Analyst focused on cyber threat intelligence and incident response, with hands-on expertise in SIEM, cloud security, and threat hunting, guiding investigations and maturing the organization’s security operations.

  • Lead complex investigations into APTs, ransomware, insider threats
  • Collect and operationalize CTI from OSINT, ISACs, and feeds
  • Present detailed intelligence assessments to technical and executive audiences
  • Track threat actor TTPs using MITRE ATT&CK
  • Develop and maintain detection logic using SIEM/EDR and cloud-native tools

Technologies include Azure Sentinel, Microsoft Defender, O365, Azure, Python/PowerShell/Bash scripting, MITRE ATT&CK, SOAR, and forensic tooling to detect, contain, and remediate threats.

The ideal candidate is a senior SOC Analyst with 5+ years in SOC operations and CTI, strong expertise in Azure Sentinel and cloud security, and a track record of leading investigations, mentoring analysts, and coordinating with MSSP/vSOC partners.

Bachelor's degree in computer scienceCybersecurityor a related technical field or equivalent industry experience in a global enterpriseMinimum 5+ years of experience in SOC operationsincident response (IR)cyber threat intelligence (CTI)or detection engineering roles
GCTIGREMGCIHGCIACISSPCEHAzure Security EngineerAWS Security SpecialistPCI-DSSHIPAAGDPRTenableWIZSAMLOAuthCSA
['SOC operations''incident response''cyber threat intelligence''SIEM''Azure Sentinel''EDR''cloud security''MITRE ATT&CK''SOAR''forensic tools''threat hunting''OSINT''ISACs''MSSP''vSOC''Python''PowerShell''Bash']
SIEM (Azure Sentinel)EDR/NDRcloud security platforms (Microsoft DefenderO365Azure)CTI analysisMITRE ATT&CKscripting (PythonPowerShellBash)SOARforensic toolsincident responsethreat huntingOSINTISACsMSSPvSOC
Strong communicationMentoring analystsCross-team collaborationExecutive communication

Preferred

GCTIGREMGCIHGCIACISSPCEHAzure Security EngineerAWS Security Specialist
Industry Technology
Job Function Elevate detection and response in the security operations center by leading CTI-driven investigations and improving automation and threat-hunting capabilities
Role Subtype SOC Analyst L3
Tech Domains Azure, Python, Windows Server, Linux, SQL / PostgreSQL
SOC AnalystCyber Threat IntelligenceCTISIEM (Azure Sentinel)Azure SentinelEDR/NDRcloud security platformsMITRE ATT&CKSOARforensic toolsincident responsethreat huntingOSINTISACsMSSPvSOCPythonPowerShellBashIncident responseThreat huntingSOC operationsMicrosoft Defender

Bachelor's degree in a relevant field, 5+ years of experience in SOC/IR/CTI, Ability to work on-site, No clear relocation or travel barriers

Apply for this Position →

Get matched to jobs like this

Luna finds roles that fit your skills and career goals — no endless scrolling required.

Create a Free Profile