3rd Shift SOC Analyst w/SSCS
Listed on 2026-01-25
-
IT/Tech
Cybersecurity, Security Manager, Network Security
Overview
Job Title: 3rd Shift SOC Analyst w/ SSCS. 11PM to 8AM EST w/ 1-hour lunch + every 5th Weekend. (NO ONSITE REQUIREMENT)
We are seeking a highly skilled 3rd Shift SOC Analyst w/ SSCS with deep expertise in Application Security to join our dynamic cybersecurity team. This role requires flexibility to support our 24x7x365 Security Operations Center, including regular off-hours coverage. This role blends real-time threat detection and response with proactive application security strategies to protect our digital assets and infrastructure.
As a senior member of the SOC, you will lead incident response efforts, mentor junior analysts, and collaborate with development teams to embed security into the software development lifecycle (SDLC). You will be instrumental in shaping our security posture across both operational and application layers.
Responsibilities- Conduct deep-dive investigations into Software supply chain Security (SSCS) threats, compromised dependencies, and malicious packages
- Design and implement security controls for third-party software dependencies and open-source components
- Monitor, detect, and respond to security incidents
- Develop and execute vulnerability management strategies with emphasis on exploitability and reachability analysis
- Perform threat hunting for emerging attack vectors
- Assess and mitigate risks associated with software dependencies across enterprise systems and applications
- Lead incident response efforts for identity-based attacks and supply chain compromises
- Develop detection use cases and threat models specific to SSCS attack vectors
- Establish security practices for evaluating and vetting third-party packages and libraries
- Collaborate with Dev Ops and engineering teams to integrate security into CI/CD pipelines
- Perform vulnerability analysis on 3rd party CVEs with in the FINRA context and work with engineering teams to fix the vulnerability
Skills & Qualifications
- Bachelor's or master's degree in computer science, Cybersecurity, Information Systems, or a related technical field
- Equivalent experience may be considered in lieu of formal education for exceptional candidates
- 5+ years of experience in SOC operations and incident response
- Desired Certifications such as CISSP, CASE, OSCP, CSSLP, or GIAC
- SIEM & EDR Tools:
Proficiency with platforms like Splunk, Sentinel, QRadar, Crowd Strike - Deep understanding of SSCS attack vectors (dependency confusion, compromised packages, malicious commits, backdoors)
- SSCS Solutions: JFrog and/or Socket.dev
- Strong knowledge of package managers (npm, PyPI, Maven, NuGet, etc.) and their security implications
- Hands-on experience with artifact repository management tools
- Application Security Tools:
Experience with SAST, DAST, and SCA tools (e.g., Veracode, Burp Suite, Sonar Qube) - Secure Coding Practices:
Deep understanding of OWASP Top 10, SANS 25, and remediation techniques - Cloud Security:
Familiarity with AWS, Azure, or GCP security configurations and container security - Proficiency with software composition analysis (SCA) tools and vulnerability reachability concepts
- Familiarity with cloud platforms (AWS, Azure, GCP) and container security
- Experience integrating security into CI/CD pipelines
- Familiarity with Dev Sec Ops principles
- Strong analytical thinking and attention to detail
- Excellent communication skills for cross-functional collaboration
- Ability to mentor junior analysts and lead incident response efforts
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).