More jobs:
Analyst, Information Security
Job in
Wilmington, Middlesex County, Massachusetts, 01887, USA
Listed on 2026-03-10
Listing for:
Analog Devices, Inc.
Full Time
position Listed on 2026-03-10
Job specializations:
-
IT/Tech
Cybersecurity, Security Manager
Job Description & How to Apply Below
US, MA, Wilmington time type:
Full time posted on:
Posted Todayjob requisition :
R261158
** About Analog Devices
** Analog Devices, Inc. (NASDAQ: ) is a global semiconductor leader that bridges the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive advancements in digitized factories, mobility, and digital healthcare, combat climate change, and reliably connect humans and the world. With revenue of more than $9 billion in FY24 and approximately 24,000 people globally, ADI ensures today's innovators stay Ahead of What's Possible(TM).
Learn more at and on and .
** L3 SOC Analyst – Cyber Threat Intelligence (CTI) Focus P4
***
* Location:
** MA, USA
** Department:
** Cybersecurity – Security Operations Centre (SOC)
** About Analog Devices (ADI)
** Analog Devices, Inc. (NASDAQ: ADI) is a global semiconductor leader bridging the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive technological advancements in industries like healthcare, automotive, industrial automation, and climate sustainability. With $9B+ in annual revenue and a global workforce of 24,000+, ADI ensures today's innovators stay Ahead of What’s Possible(TM).
Learn more at **.
**** Role Overview
** We’re looking for a Senior SOC Analyst with strong Cyber Threat Intelligence (CTI) expertise to elevate our detection and response capabilities. In this role, you’ll drive operational excellence through intelligence‐led threat hunting, advanced investigations, and strategic incident response leadership. As a player‐coach, you’ll lead complex investigations, mentor analysts, and strengthen our SOC through improvements in detection engineering, CTI integration, and automated response.
You’ll work across teams, communicate clearly with both technical and executive stakeholders, and help protect critical business assets through proactive, intelligence‐driven defence.
** Key Responsibilities
*** Lead complex investigations into APTs, ransomware, insider threats, and other advanced adversarial activities affecting the organization.
* Collect, analyze, and operationalize CTI from OSINT, commercial feeds, ISACs, and internal telemetry to enhance detection and response capabilities.
* Create and present detailed intelligence assessments and executive briefings for both technical and non-technical audiences.
* Track and profile threat actor TTPs using frameworks like MITRE ATT&CK to pre-empt emerging risks.
* Develop and maintain advanced detection logic using SIEM, EDR, and cloud-native tools to ensure comprehensive coverage.
* Conduct proactive threat hunting to identify and mitigate undetected or emerging threats.
* Design and implement automated containment workflows, such as device isolation, email purging, and session revocation.
* Maintain the incident response plan, ransomware decision framework, and other key operational templates.
* Publish and help manage SOC KPIs/OKRs, such as MTTD/MTTR, false positive rates, and detection coverage metrics.
* Oversee MSSP/vSOC partners, ensuring maximum value and alignment with detection and response strategies.
** Required Qualifications
*** Bachelor’s degree in computer science, Cybersecurity, or a related technical field or equivalent industry experience in a global enterprise.
* Minimum 5+ years of experience in SOC operations, incident response (IR), cyber threat intelligence (CTI), or detection engineering roles.
** Technical Expertise
*** Advanced knowledge of SIEM (preferably Azure Sentinel), EDR/NDR, and cloud security platforms (e.g., Microsoft Defender suite, O365, Azure).
* Expertise in CTI analysis, including threat actor profiling, malware analysis, and TTP tracking.
* Proficiency in scripting and automation using Python, Power Shell, or Bash to streamline SOC workflows.
* Hands-on experience with MITRE ATT&CK, SOAR, and forensic tools for incident response and threat detection.
** Preferred Skills
**…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×