Motion Recruitment | Jobspring | Workbridge

Senior SOC Analyst / Tier 3

New York, New York

Hybrid

Direct Hire

$150k - $175k

Our client, a leader in the financial services industry, is seeking a Senior SOC Analyst (Tier 3) to join their dynamic and fast-paced Security Operations Center (SOC) team. This role is a hybrid position based in Midtown Manhattan and offers the unique opportunity to take on advanced threat detection and incident response responsibilities while mentoring junior analysts and enhancing the SOC’s overall capabilities.

Why This Role Is Unique:

As a Senior SOC Analyst (Tier 3), you will be the go-to expert for high-priority incidents and complex threat investigations. This is a pivotal role within the organization’s cybersecurity strategy, requiring hands-on technical skills and strategic thinking. You will work alongside a team of skilled professionals to detect, analyze, and respond to security threats while playing a key role in refining incident response protocols. If you’re passionate about cybersecurity, thrive in a collaborative environment, and have a keen eye for detail, this role is for you.

Required Skills & Experience:

  • 5+ years of experience working in a Security Operations Center (SOC) or equivalent cybersecurity environment.
  • Expertise in threat detection, analysis, and incident response, with hands-on experience handling complex security events.
  • Proficiency with SIEM tools (e.g., Splunk, QRadar, ArcSight) and advanced threat detection platforms.
  • Strong knowledge of network protocols, operating systems (Windows and Linux), and cyber attack techniques (e.g., MITRE ATT&CK framework).
  • Experience with endpoint detection and response (EDR) tools and threat intelligence platforms.
  • Strong analytical and problem-solving skills with the ability to make quick, informed decisions.
  • Excellent communication skills for reporting and briefing stakeholders on security incidents.

Desired Skills & Experience:

  • Relevant certifications (e.g., GCIA, GCIH, CISSP, CEH).
  • Experience with threat hunting and proactive security monitoring.
  • Knowledge of malware analysis and digital forensics.
  • Experience mentoring and training junior analysts.
  • Familiarity with SOAR (Security Orchestration, Automation, and Response) platforms.

What You Will Be Doing:

Tech Breakdown:

  • 50% Threat Detection and Analysis
  • 30% Incident Response and Mitigation
  • 20% Mentoring and Process Improvement

Daily Responsibilities:

  • 60% Hands-On Security Monitoring and Analysis
  • 25% Incident Handling and Response
  • 15% Training and Mentoring Junior Analysts

The Offer:

  • Competitive base salary and potential for performance-based bonuses
  • Comprehensive benefits, including Medical, Dental, and Vision Insurance
  • 401(k) with employer match
  • Flexible PTO and paid parental leave
  • Professional development opportunities and certification reimbursement
  • Hybrid work model for work-life balance

Applicants must be currently authorized to work in the US on a full-time basis now and in the future.

#LI-DI1

Posted by: David Inman

Specialization: Security Operations

Related Jobs

    Not Ready To Apply?

    Send us your resume and we’ll get started matching you with the right job.