×
Register Here to Apply for Jobs or Post Jobs. X

Lead SOC Analyst

Job in Vancouver, BC, Canada
Listing for: IFS
Full Time position
Listed on 2026-02-27
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, Cloud Computing, Security Manager
Job Description & How to Apply Below
Job Description

Position Summary

The Senior Security Operations Center (SOC) Analyst at Copperleaf plays a critical role in protecting our global SaaS platform, internal systems, and customer environments. This role requires deep technical expertise in cloud‑centric security operations, advanced detection and response, and strong familiarity with enterprise technologies that support Copperleaf’s product ecosystem and operational security.

Senior Analysts lead complex investigations, support continuous operational improvement, and strengthen our ability to rapidly detect and respond to threats targeting cloud workloads (Azure), identity systems (Azure AD/Entra ), clusters, endpoint platforms, and customer‑integrated data pipelines. This role also mentors junior analysts and collaborates closely with Security Engineering, Cloud Ops, IT, and Incident Response to improve detection logic, logging visibility, automation, and resiliency across Copperleaf’s environment.

Key Responsibilities

Leadership & Team Support

  • Act as a senior escalation point for SOC investigations, providing guidance aligned to Copperleaf’s security architecture and operational practices.

  • Mentor junior analysts and help drive team maturity in cloud security, detection engineering, and SaaS‑specific monitoring.

  • Recommend training and process enhancements to support ongoing professional development.

  • Participate in tabletop exercises tailored to Copperleaf’s product, cloud, and operational risk scenarios.

Security Monitoring & Incident Response

  • Lead investigations into security alerts across Copperleaf’s Azure‑hosted environments, identity systems, corporate endpoints, and product infrastructure.

  • Support incident response activities including containment, remediation, documentation, and lessons‑learned.

  • Analyze logs from Azure Monitor, Entra , Kubernetes clusters, application services, and customer‑facing integrations.

  • Create detections mapped to MITRE ATT&CK for cloud and SaaS environments.

  • Maintain and improve SOC playbooks and SOPs specific to Copperleaf’s operational, compliance, and customer commitments.

  • Recommend tuning of cloud-native and third‑party detection tools to reduce false positives.

  • As part of your role, you may be required to participate in an on‑call rotation to support business‑critical operations outside of standard working hours.

Threat Intelligence, Detection Engineering & Automation

  • Track emerging threats relevant to SaaS providers, cloud platforms, Kubernetes, identity infrastructure, and AI‑driven attack techniques.

  • Conduct proactive threat hunting across cloud workloads, identity logs, endpoints, and product telemetry.

  • Develop and refine KQL queries, automation workflows, and SOAR playbooks.

  • Evaluate logging coverage across Azure, product services, and corporate systems, ensuring alignment to Copperleaf’s observability standards.

Cross‑Functional Collaboration

  • Collaborate with Security Engineering, Cloud Ops, IT, and Platform teams to enhance detection capabilities and ensure appropriate telemetry.

  • Contribute to operational KPIs, metrics, and reporting used for Copperleaf leadership updates.

  • Share insights, documentation, and best practices to support overall team improvement.

  • Partner with Cloud Ops and Engineering on secure configuration, operational visibility, and incident readiness.

Qualifications

Skills & Experience Requirements

  • 5+ years of SOC monitoring, cloud‑focused incident response, or cybersecurity experience.

  • Strong understanding of threats targeting SaaS platforms, Azure cloud environments, Kubernetes, and enterprise identity systems.

  • Proficiency in scripting languages (Python, Bash, Power Shell, JavaScript) and KQL for advanced log analysis.

  • Hands‑on experience with SIEM, SOAR, EDR/XDR, threat intel platforms, cloud security tooling, and identity security controls.

  • Familiarity with frameworks and regulations relevant to Copperleaf (ISO 27001, SOC 2, NIST CSF, CIS Controls, GDPR).

  • Expertise with Windows, macOS, and Linux systems.

Education Requirements

  • Bachelor's degree preferred in cybersecurity, computer science, engineering, or related fields.

Certification Requirements

Preferred certifications include:

  • GIAC Certified Incident Handler (GCIH)

  • GIAC Defending Advanced Threats (GDAT)

  • GIAC Certified Enterprise Defender (GCED)

  • Microsoft Certified SOC Analyst

  • CISSP

  • Azure Security Engineer (AZ‑500) — strongly preferred for cloud‑focused operations

Additional Information

We embrace flexibility and hybrid work opportunities to support diverse needs and lifestyles, while also valuing inclusive workplace experiences. By fostering a sense of community, we drive innovation, strengthen connections, and nurture belonging. Our commitment ensures you can work in a way that suits you best, while also engaging with colleagues to share ideas and build meaningful relationships.

Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary