×
Register Here to Apply for Jobs or Post Jobs. X

Security Operations Center Analyst

Job in Bristol, Washington County, Virginia, 24202, USA
Listing for: TRIA
Full Time position
Listed on 2026-01-12
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below

(Must have Internal/ In-house SOC Experience)

I’m working with a company that’s continuing to invest in and grow their IT Security function and is now looking to bring in a skilled SOC Analyst
.

This is a great opportunity to join a forward-thinking security operations team
, where you’ll have hands-on ownership across threat detection, incident response, and overall security posture
, alongside a competitive salary, strong benefits, and clear long-term development opportunities
.

The role offers flexible, hybrid working with only monthly office attendance
, and they’re open to candidates from general SOC or Info Sec backgrounds, sector experience is a bonus, not a requirement.

Responsibilities
  • Operate, tune and configure SIEM tools
  • Monitor and triage security alerts, applying custom queries (e.g. KQL) and correlation rules to detect suspicious activity.
  • Investigate security incidents across endpoints, networks, and cloud environments; perform root-cause analysis, impact assessment and containment actions.
  • Develop and maintain detection rules, use cases, threat-intelligence processes, and incident response playbooks.
  • Automate detection and response workflows, using scripting tools (e.g. Python, Power Shell).
  • Perform threat-hunting, log-analysis (including firewall, web/email filters), implement or review DLP controls, and collaborate with infrastructure/cloud/application teams on remediation and security posture improvements.
Qualifications
  • Strong working knowledge of Microsoft security stack (e.g. Sentinel, Defender) and hands-on experience with SIEM tooling, alerts triage, detection logic, and security incident workflows.
  • Ability to write and optimise detection queries (e.g. in KQL), review firewall and security logs, manage email/web filtering policies, and implement / review Data Loss Prevention (DLP) controls.
  • Experience with automation or scripting (e.g. Python, Power Shell) to streamline detection/response and improve SOC efficiency.
  • Threat-hunting and analytical mindset; proactive and collaborative approach; good communication skills and ability to work across teams.

If you're looking to join an established team that will aid career growth, whilst offering an excellent work-life balance.

Apply

Apply NOW

#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary