Position Details
About this role
Senior SOC Analyst focusing on cyber threat intelligence and threat detection/response. Owns CTI collection and operationalization, threat actor profiling, and the development of detection logic using SIEM/EDR/cloud-native tools, while leading proactive threat hunts.
Key Responsibilities
- Lead complex investigations into APTs, ransomware, insider threats
- Collect, analyze, and operationalize CTI from OSINT, commercial feeds, ISACs
- Create and present intelligence assessments and executive briefings
- Track and profile threat actor TTPs using MITRE ATT&CK
- Develop and maintain advanced detection logic using SIEM, EDR, and cloud-native tools
Technical Overview
Hands-on with SIEM (Azure Sentinel) and EDR (Microsoft Defender), cloud security tooling, scripting (Python/PowerShell/Bash), MITRE ATT&CK, SOAR, and forensics. Integrates CTI from OSINT, ISACs, and internal telemetry; develops executive briefings and KPI-driven analytics.
Ideal Candidate
The ideal candidate is a senior SOC analyst with 5+ years in SOC/CTI, hands-on experience with Azure Sentinel and Microsoft Defender, and a strong track record integrating CTI into detection and response. They excel at leading investigations, mentoring others, and communicating complex intel to technical and executive audiences.
Must-Have Skills
Nice-to-Have Skills
Tools & Platforms
Required Skills
Hard Skills
Soft Skills
Certifications
Preferred
Industry & Role
Keywords for Your Resume
Deal Breakers
Bachelor's degree required, 5+ years of relevant experience
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile