More jobs:
Security Operations Center; SOC Analyst – Incident Response
Job in
King of Prussia, Montgomery County, Pennsylvania, 19406, USA
Listed on 2026-02-01
Listing for:
Top Stack
Full Time
position Listed on 2026-02-01
Job specializations:
-
IT/Tech
Cybersecurity
Job Description & How to Apply Below
Overview
We are seeking a skilled to join our team, responsible for the identification, triage, and response to security events and incidents. You will work with advanced security tools to analyze and investigate suspicious activities across multiple operating systems, proactively hunt threats, and help maintain our overall cyber resilience.
Key Responsibilities- Monitor, correlate, and perform initial triage of security events and alerts to assess scope, urgency, and potential impact.
- Document and manage incidents from detection to resolution, ensuring detailed and accurate reporting.
- Conduct host-based forensic analysis across Windows, Linux, and macOS environments to detect suspicious or malicious activity.
- Maintain expertise in operating system internals and artifacts to support ongoing investigations.
- Analyze various data sources to identify and assess past or ongoing security threats.
- Provide after-hours on-call support (including weekends) as part of a rotational schedule for critical incident response.
- Execute threat hunting activities to proactively identify undetected threats and inform security tool improvements.
- Build and optimize SIEM dashboards to highlight incidents and monitor activity effectively.
- Tune and maintain security policies and configurations across tools like EDR, IPS, and content filters to minimize false positives and improve detection accuracy.
- 3–5 plus years of experience in security operations, incident response, vulnerability management, intrusion detection, or related areas.
- 3–5 plus years of experience with Splunk, Linux and Windows Analysis
- Hands-on experience with EDR/XDR technologies and/or open-source DFIR tools (e.g., KAPE, Plaso/Log2
Timeline, Autopsy). - Strong understanding of Windows and Linux operating systems, including forensic artifacts and investigation techniques.
- Proficiency in analyzing logs, events, and other telemetry from various enterprise data sources.
- Experience creating SIEM dashboards and tuning security tools to enhance detection and reduce alert fatigue.
- Bachelor’s degree in a related field or equivalent work experience.
- Associate
- Full-time
- Information Technology
- Hospitals and Health Care
- Insurance
- Financial Services
Location:
Philadelphia, PA
Salary: $-$
#J-18808-LjbffrTo View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×