Motion Recruitment
Our client, a leader in the financial services industry, is seeking a Senior SOC Analyst (Tier 3) to join their dynamic and fast-paced Security Operations Center (SOC) team. This role is a hybrid position based in Midtown Manhattan and offers the unique opportunity to take on advanced threat detection and incident response responsibilities while mentoring junior analysts and enhancing the SOC's overall capabilities.
Why This Role Is Unique:
As a
Senior SOC Analyst (Tier 3) , you will be the go-to expert for high-priority incidents and complex threat investigations. This is a pivotal role within the organization's cybersecurity strategy, requiring hands-on technical skills and strategic thinking. You will work alongside a team of skilled professionals to detect, analyze, and respond to security threats while playing a key role in refining incident response protocols. If you're passionate about cybersecurity, thrive in a collaborative environment, and have a keen eye for detail, this role is for you.
Required Skills & Experience:
5+ years of experience working in a Security Operations Center (SOC) or equivalent cybersecurity environment. Expertise in threat detection, analysis, and incident response, with hands-on experience handling complex security events. Proficiency with SIEM tools (e.g., Splunk, QRadar, ArcSight) and advanced threat detection platforms. Strong knowledge of network protocols, operating systems (Windows and Linux), and cyber attack techniques (e.g., MITRE ATT&CK framework). Experience with endpoint detection and response (EDR) tools and threat intelligence platforms. Strong analytical and problem-solving skills with the ability to make quick, informed decisions. Excellent communication skills for reporting and briefing stakeholders on security incidents. Desired Skills & Experience:
Relevant certifications (e.g., GCIA, GCIH, CISSP, CEH). Experience with threat hunting and proactive security monitoring. Knowledge of malware analysis and digital forensics. Experience mentoring and training junior analysts. Familiarity with SOAR (Security Orchestration, Automation, and Response) platforms. What You Will Be Doing:
Tech Breakdown:
50% Threat Detection and Analysis 30% Incident Response and Mitigation 20% Mentoring and Process Improvement Daily Responsibilities:
60% Hands-On Security Monitoring and Analysis 25% Incident Handling and Response 15% Training and Mentoring Junior Analysts The Offer:
Competitive base salary and potential for performance-based bonuses Comprehensive benefits, including Medical, Dental, and Vision Insurance 401(k) with employer match Flexible PTO and paid parental leave Professional development opportunities and certification reimbursement Hybrid work model for work-life balance
Applicants must be currently authorized to work in the US on a full-time basis now and in the future.
#LI-DI1
Posted by:
David Inman
Specialization:
Security Operations
Why This Role Is Unique:
As a
Senior SOC Analyst (Tier 3) , you will be the go-to expert for high-priority incidents and complex threat investigations. This is a pivotal role within the organization's cybersecurity strategy, requiring hands-on technical skills and strategic thinking. You will work alongside a team of skilled professionals to detect, analyze, and respond to security threats while playing a key role in refining incident response protocols. If you're passionate about cybersecurity, thrive in a collaborative environment, and have a keen eye for detail, this role is for you.
Required Skills & Experience:
5+ years of experience working in a Security Operations Center (SOC) or equivalent cybersecurity environment. Expertise in threat detection, analysis, and incident response, with hands-on experience handling complex security events. Proficiency with SIEM tools (e.g., Splunk, QRadar, ArcSight) and advanced threat detection platforms. Strong knowledge of network protocols, operating systems (Windows and Linux), and cyber attack techniques (e.g., MITRE ATT&CK framework). Experience with endpoint detection and response (EDR) tools and threat intelligence platforms. Strong analytical and problem-solving skills with the ability to make quick, informed decisions. Excellent communication skills for reporting and briefing stakeholders on security incidents. Desired Skills & Experience:
Relevant certifications (e.g., GCIA, GCIH, CISSP, CEH). Experience with threat hunting and proactive security monitoring. Knowledge of malware analysis and digital forensics. Experience mentoring and training junior analysts. Familiarity with SOAR (Security Orchestration, Automation, and Response) platforms. What You Will Be Doing:
Tech Breakdown:
50% Threat Detection and Analysis 30% Incident Response and Mitigation 20% Mentoring and Process Improvement Daily Responsibilities:
60% Hands-On Security Monitoring and Analysis 25% Incident Handling and Response 15% Training and Mentoring Junior Analysts The Offer:
Competitive base salary and potential for performance-based bonuses Comprehensive benefits, including Medical, Dental, and Vision Insurance 401(k) with employer match Flexible PTO and paid parental leave Professional development opportunities and certification reimbursement Hybrid work model for work-life balance
Applicants must be currently authorized to work in the US on a full-time basis now and in the future.
#LI-DI1
Posted by:
David Inman
Specialization:
Security Operations