×
Register Here to Apply for Jobs or Post Jobs. X

Senior Security Operations Center Analyst

Job in Denver, Denver County, Colorado, 80285, USA
Listing for: RingCentral
Full Time position
Listed on 2026-01-17
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

Say hello to opportunities.

It’s not everyday that you consider starting a new career. We’re Ring Central, and we’re happy that someone as talented as you is considering this role. First, a little about us, we’re a $2 Billion annual revenue company with double digit Annual Recurring Revenue (ARR) and a $93 Billion market opportunity in UCaaS, Contact Center and AI‑powered adjacencies. We invest more than $250 million annually to ensure our AI‑enabled technology and platforms meet or exceed the needs of our customers.

Ring Sense AI is our proprietary AI solution. It’s designed to fit the business needs of our customers, orchestrated to be accurate and precise, and built on the same open platform principles we apply to our core software solutions.

This is where you and your skills come in. We’re currently looking for:
Security Operations Center Analyst

Job Type: Full‑Time, 2 days on (08.00 PDT AM - 08.00 PDT PM) 2 days off

Location:

Denver, CO

Department:
Security

This is a great opportunity to work at a rapidly growing, market leading Unified Communications as‑a‑service company. Ring Central provides Voice‑over‑IP (VoIP), hosted PBX, voicemail, SMS, e‑fax, and HD video meeting solutions for business.

About this role

As a SOC Analyst at Ring Central, your primary responsibilities are to implement a comprehensive security monitoring, incident response and threat intelligence program for Ring Central’s global cloud service, corporate and development environments. You will also be collaboratively providing feedback to improve security operations processes, generating actionable analysis and threat intelligence from tools, logs, and other data sources, ensuring strong documentation is in place to support ongoing SOC activities, and reporting your observations to other Security, Operations and IT personnel.

Job Description
  • Have proven skills in application security, security monitoring, incident response and intrusion analysis
  • Have strong knowledge of the diverse methods and technologies used to attack web/mobile/desktop applications, SaaS infrastructure, and data
  • Think critically, work well under pressure, and possess strong analytical, written, verbal, and interpersonal skills
  • Demonstrated track record of quality processes in candidate’s work history
  • Be strongly self‑motivated with an aptitude for both individual and team‑oriented work
  • Have experience following and refining standard operating procedures and playbooks
Responsibilities
  • Monitor security events, analyze and investigate alarms, and maintain day‑to‑day operational activities of a secure cloud environment
  • Engage teams within and outside of Ring Central to mitigate and resolve cases
  • Maintain relevant documentation and audit artifacts
  • Identify and track suspicious system activity
  • Identify trends and patterns, and present them to Security Engineers to enhance our processes and systems
  • This role participates in on‑call rotations
Qualifications / Requirements
  • 2+ years in a security engineering, SRE, or SOC roles in a cloud services environment
  • Experience with SIEM
  • Experience investigating security incidents
  • Basic knowledge AWS or GCP
  • Experience with IDS, case management, and related tools and practices
  • Experience with Linux, Red Hat preferred
  • Basic knowledge of broad security topics such as encryption, application security, malware, ransomware, etc.
  • Knowledge of network, VoIP and web related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS, SIP, RTP)
Preferred Skills/Experience
  • Experience using Crowdstrike, Cloudflare, Fire Power, Splunk, ELK, Imperva, Syslog, packet capture, and Windows Event Log tools and similar tools
  • Knowledge of current hacking techniques, malicious code trends, botnets, exploits, malware, DDoS, and data breach events
  • Strong knowledge of Microsoft Windows
  • Experience automating security tasks, including scripting, programming and/or Sec Dev Ops
  • Experience working with global teams
Any combination of the following certifications
  • GCIA (GIAC Certified Intrusion Analyst)
  • GCIH (GIAC Certified Incident Handler)
  • GCIA (GIAC Certified Intrusion Analyst)
  • GCFA (GIAC Certified Forensic Analyst)
  • GNFA (GIAC Certified Network Forensic Analyst)
  • GCFE (GIAC Forensic Examiner)
  • GAS…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary