More jobs:
Security Operations Center Analyst
Job in
Phoenix, Maricopa County, Arizona, 85003, USA
Listed on 2026-02-24
Listing for:
Insight Global
Full Time
position Listed on 2026-02-24
Job specializations:
-
IT/Tech
Cybersecurity, Security Manager
Job Description & How to Apply Below
Salary Range: $50,000-$75,000 + Benefits (Dependent on Experience)
The SOC Security Analyst plays a critical role in delivering Managed Detection and Response (MDR/MXDR) services to a diverse client base. In this role, you’ll monitor, investigate, and respond to security threats across complex environments while serving as a trusted security partner to our clients.
You’ll work hands-on with modern MXDR platforms, collaborate with cross‑functional security teams, and help ensure threats are detected early and resolved efficiently—without compromising service quality or communication.
What You’ll Do- Monitor client environments using MXDR platforms that integrate SIEM, EDR, NDR, and threat intelligence.
- Triage, correlate, and validate security alerts in real time across multiple client environments.
- Investigate security incidents to determine root cause, impact, and remediation recommendations.
- Execute incident response procedures and coordinate containment and recovery with client IT/security teams.
- Tune detection rules, analytics, and correlation logic to improve signal quality and reduce false positives.
- Create and maintain incident tickets, SOC documentation, and client-facing reports in alignment with SLAs.
- Partner with Threat Intelligence and Engineering teams to continuously enhance detection and response capabilities.
- Support onboarding of new clients, including tool configuration, baseline development, and monitoring setup.
- Participate in threat hunting and proactive security posture assessments.
- Stay current on emerging threats, attacker techniques, and industry frameworks (MITRE ATT&CK, NIST, etc.).
- 2+ years of experience in a SOC, MDR/MXDR, or managed security services environment.
- Hands-on experience with SIEM and XDR tools such as Microsoft Sentinel, Crowd Strike Falcon, Sentinel One, Elastic, or Splunk.
- Strong understanding of security event analysis, threat detection techniques, and the incident response lifecycle.
- Experience correlating logs across cloud, network, and endpoint data sources.
- Familiarity with security tools including EDR, NDR, IDS/IPS, and vulnerability management platforms.
- Customer-focused mindset with the ability to communicate clearly and professionally with clients.
- Solid knowledge of networking fundamentals, endpoint behavior, and common attack indicators.
- Strong analytical thinking, documentation, and problem-solving skills.
- Security certifications such as Security+, CySA+, CEH, GCIA, GCIH, or Microsoft SC‑200.
- Experience with SOAR automation and playbook development.
- Background in multi-tenant SOC or MSSP environments.
- Exposure to compliance and regulatory frameworks (ISO 27001, SOC 2, HIPAA, etc.).
- Scripting experience (Python, Power Shell) for automation or enrichment.
- Operates within a 24x7 global MXDR SOC.
- May include rotational shifts, on-call responsibilities, and collaboration across time zones.
- Fast-paced, collaborative, and client-focused environment centered on proactive security outcomes.
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×