×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Senior SOC Analyst​/Threat Hunter

Job in Deer Park, Hamilton County, Ohio, USA
Listing for: Lubrizol Corporation
Full Time position
Listed on 2026-02-01
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 90000 - 110000 USD Yearly USD 90000.00 110000.00 YEAR
Job Description & How to Apply Below
Location: Deer Park

Lubrizol Corporation, a Berkshire Hathaway company, is a specialty chemical company whose science delivers sustainable solutions to advance mobility, improve wellbeing and enhance modern life. Founded in 1928, Lubrizol owns and operates more than 100 manufacturing facilities, sales, and technical offices around the world and has about 8,000 employees. For more information, visit

We value diversity in professional backgrounds and life experiences. By enabling a consistent, unbiased, and transparent recruitment process, Lubrizol seeks to create a positive experience for candidates so we can get to know them at their best. We recognize unique work and life situations and offer flexibility, ensuring our employees feel engaged and fulfilled in every aspect of life.

Job Title

Senior SOC Analyst/Threat Hunter

Job Location

Wickliffe, OH

Job Type

Permanent

Type of Role

Hybrid (4 days in office, 1 day remote)

What You’ll Do

The Senior SOC Analyst / Threat Hunter is responsible for proactive threat detection, incident response, and automation within a global Security Operations Center (SOC). This role leverages advanced analytics, threat intelligence, and AI-driven tools to identify and mitigate sophisticated cyber threats across digital assets, infrastructure, and cloud environments. This position is a member of the Information Technology (IT) division and reports to the Security Operations Center Manager.

What

We’re Looking For
  • Execute defined incident response playbooks to investigate security incidents, including clear documentation of incident artifacts and business impacts/concerns.
  • Develop new investigation and response playbooks.
  • Automate repetitive SOC tasks using Python, Power Shell, and SOAR platforms to improve response time and reduce analyst fatigue.
  • Leverage AI/ML-enhanced tools (e.g., SOAR platforms) to improve detection and response efficiency.
  • Integrate MITRE ATT&CK and behavioral analytics into threat detection workflows.
  • Conduct hypothesis-driven threat hunts using structured methodologies.
  • Collaborate with threat intelligence platforms (e.g., MISP, Recorded Future) to enrich investigations.
  • Design and execute proactive, hypothesis-based threat hunts across endpoints, networks, and cloud environments using behavioral indicators and threat models.
  • Participate in the development and continual refinement of security group operating practices/processes.
  • Provide training on tools and team processes for new analysts, Co-Ops, and interns.
  • Participate in the definition of security policies, procedures, and standards. Implement, enhance, and execute security policies, procedures, and standards.
  • Serve on projects and initiatives as a subject matter expert and technical advisor as assigned.
  • Other information security activities as needed.
Required Qualifications
  • Bachelor’s degree in cybersecurity, or computer science, or a related field with an equivalent combination of education and experience in cybersecurity.
  • 2 or more industry‑recognized cybersecurity certifications (e.g., MAD, GSOC, GCIH, CEH).
  • Minimum of 7 years’ experience in cybersecurity roles.
  • 4+ years of hands‑on technical IT support experience with strong understanding of networking, operating systems, and Microsoft Active Directory.
  • Excellent analytical and problem‑solving skills, with the ability to assess complex security issues and develop effective solutions.
  • Strong written and verbal communications skills.
  • Familiarity with MITRE ATT&CK, Sigma rules, and YARA for threat detection.
  • Experience with XQL, KQL, or other query languages for large‑scale data analysis.
  • Ability to build relationships and work in a collaborative, matrix‑driven, global environment.
  • Strong IT process discipline.
  • Sound decision making, proactive/creative problem solving and strategic thinking skills.
  • Must be a self‑starter, able to manage multiple priorities and meet deadlines while providing quality customer service to internal and external stakeholders.
  • Knowledge and experience with security access administration systems and processes.
  • Knowledge and experience with Windows operating systems and Microsoft Active Directory.
  • Familiarity with industry standards and frameworks (e.g., NIST, CIS…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary