$100K - 140K a year
Lead and mentor SOC analysts, coordinate security incident triage and threat hunting, manage client communications, and improve security operations and team performance.
US citizen based on West Coast or Central US working PDT timezone, L3 experience with Defender, Sentinel, and Splunk, leadership and mentoring experience in SOC environment.
17th October, 2025 SENIOR SECURITY ANALYST - MSS SECURITY OPERATIONS CENTER The successful candidate: • Will be a US Citizen + able to pass Security Clearance • Currently based on the West Coast: Washington State, Seattle, Las Vegas, Oregon, Nevada, Arizona, California • OR the role is open applicants based in any Central state in the US and happy to work on PDT time zone. • Will have L3 experience of Defender, Sentinel and Splunk Please apply if you tick all the points above, we will be in touch to discuss next steps. About CyberCX CyberCX is the leading global independent cyber security services organization in United States, United Kingdom, Australia, and New Zealand. We are cyber security experts first and foremost. We're a unified team of highly qualified, certified and skilled professionals working together on the same mission: to protect and defend organizations from cyber threats. We specialize in: Strategy & Consulting | Governance, Risk & Compliance | Security Testing & Assurance | Identity & Access Management | Security Integration & Engineering | Managed Security Services | Digital Forensics & Incident Response | Cyber Capability, Education & Training Position Summary & Primary Objectives Reporting to the Vice President of Project Delivery, the Team Lead - MSS Security Operations Center is responsible for providing technical and people leadership to a pod of Security Analysts and Senior Security Analysts. They perform technical account management functions across several customers and are the first point of escalation for a customer issue. Key Roles & Responsibilities • Coordinate and mentor staff to conduct SIEM-based event analysis and incident triage: perform coordination and management of security incidents and projects, remotely and onsite, with internal and external stakeholders • Coordinate threat hunting activities, perform and lead vulnerability assessment activities, and develop new detection capabilities and concepts through the creation and tuning of alerts • Provide end to end support for client and internal systems • Provide operational support and project support with clients, taking the initiative to drive improvement and deliver successful outcomes for customers • Conduct internal and client communications around security issues • Manage rostering of the team to ensure adequate coverage across customer accounts • Actively collaborate across CyberCX, and continuously look for ways to add value. Facilitate communication and partnerships across the business to allow teams to better engage and service customers • Lead, coach and build high performing teams to enable learning, development, and capability uplift. Understand each team member's skills, drivers, and aspirations. Work with them ongoing to develop, raise capability, and build a career and progression plan • Enhance team's effectiveness by taking ownership of team issues and goals. Create a culture of empowerment, collaboration, and accountability through consistent employee engagement Preferred Qualifications, Experience & Skills • Will have L3 experience of Defender, Sentinel and Splunk • CrowdStrike and Palo Alto are desirable • Previously mentored more junior SOC Analysts
This job posting was last updated on 10/21/2025