Kavaliro
Join to apply for the
Sr SOC Analyst
role at
Kavaliro Join to apply for the
Sr SOC Analyst
role at
Kavaliro Get AI-powered advice on this job and more exclusive features. Job Description
Kavaliro is seeking an Sr SOC Analyst to support a client onsite in Orlando, FL. Job Description
Kavaliro is seeking an Sr SOC Analyst to support a client onsite in Orlando, FL.
Roles And Responsibilities
Act as a senior escalation point for cybersecurity alerts, threats, and incidents. Provide expert-level guidance in cybersecurity domains, including threat intelligence, incident response, and security operations. Triage and assess security events to determine severity, validate incidents, and coordinate appropriate response efforts. Identify and remediate active threats using log analysis, threat intelligence feeds, and advanced detection techniques. Evaluate and respond to newly discovered vulnerabilities and attacker TTPs to improve detection and response measures. Participate in a rotating on-call schedule to maintain 24/7 cybersecurity coverage. Mentor and support less experienced SOC analysts, providing technical leadership and training. Lead proactive threat hunting activities based on internal risk factors and external intelligence. Develop and maintain forensic capabilities, tools, and procedures. Support Security Orchestration, Automation and Response (SOAR) tools, including administration and use case development. Create advanced search queries and detection content for SIEM platforms using scripting and custom logic. Build and enhance use cases by integrating log sources and developing correlation rules. Incorporate actionable threat intelligence into security platforms for proactive defense. Conduct forensic investigations in support of internal investigations and incident response. Translate adversary TTPs into indicators of compromise (IOCs) and detection logic. Lead post-incident reviews, document findings, and recommend improvements to prevent recurrence. Develop, refine, and maintain SOC metrics and operational playbooks. Evaluate existing security technologies and identify improvements to strengthen overall security posture. Collaborate across cybersecurity, infrastructure, and application teams to ensure cohesive defense strategies.
Required Technical Skills
Minimum 7+ years of experience in cybersecurity, with at least 4+ years focused on incident response. Certified Information Systems Security Professional (CISSP) required. At least two additional current certifications (e.g., CEH, GIAC, CCNA/CCNP, EnCE). Proficient in SIEM platforms and advanced event correlation analysis. Deep knowledge of network and application security, forensics, threat detection, and vulnerability management. Hands-on experience with SOAR platforms and automation pipelines. Familiarity with MITRE ATT&CK and the Cyber Kill Chain frameworks. Strong understanding of threat vectors such as DDoS, malware, phishing, port scans, and web attacks. Practical knowledge of defensive strategies and countermeasures for common exploits and vulnerabilities. Experience with forensic tools and investigation methodologies. Proficient in Linux, Windows, and command-line tools for log and evidence analysis. Strong scripting skills (Python, Bash, PowerShell, Perl). Ability to craft custom detections using YARA rules, regex, and query languages.
Required Education
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field; or equivalent experience.
Kavaliro provides Equal Employment Opportunities to all employees and applicants. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Kavaliro is committed to the full inclusion of all qualified individuals. In keeping with our commitment, Kavaliro will take the steps to assure that people with disabilities are provided reasonable accommodations. Accordingly, if reasonable accommodation is required to fully participate in the job application or interview process, to perform the essential functions of the position, and/or to receive all other benefits and privileges of employment, please respond to this posting to connect with a company representative.
Job Requirements
Hybrid Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries IT Services and IT Consulting Referrals increase your chances of interviewing at Kavaliro by 2x Sign in to set job alerts for “Security Operations Center Analyst” roles.
Security Assistant, Secret Clearance, Hourly - Orlando, FL
F-35 Info Sys Sec Officer, Orlando, FL - Mid-Career
F-35 Info Sys Sec Officer, Orlando, FL - Mid-Career
Greater Orlando $99,461.00-$128,329.00 1 week ago Network Security Engineer - Need only w2 or 1099
Network Security Specialist (Forensic Analyst)
Information Security Systems Engineer (ISSE)
Security Control Assessor Representative
GRC Specialist - Public Sector, IT Operations
Cloud Security Engineer - Public Sector, IT Operations
Senior Security Engineer, Security Assurance
Senior Cyber Security Engineer / CSET Lead
Lead Security Engineer - Security Assurance
Manufacturing Engineer-Security Clearance Eligibility Required
Senior Associate, Cyber Operations (shift work)
Senior Specialist, Identity and Access Management
IT Manager, Cyber Security and Emerging Technologies
Senior Specialist, Identity Access Management
Cyber SDC- M365 Security Operations Lead Engineer - Senior - Consulting - Location Open
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Sr SOC Analyst
role at
Kavaliro Join to apply for the
Sr SOC Analyst
role at
Kavaliro Get AI-powered advice on this job and more exclusive features. Job Description
Kavaliro is seeking an Sr SOC Analyst to support a client onsite in Orlando, FL. Job Description
Kavaliro is seeking an Sr SOC Analyst to support a client onsite in Orlando, FL.
Roles And Responsibilities
Act as a senior escalation point for cybersecurity alerts, threats, and incidents. Provide expert-level guidance in cybersecurity domains, including threat intelligence, incident response, and security operations. Triage and assess security events to determine severity, validate incidents, and coordinate appropriate response efforts. Identify and remediate active threats using log analysis, threat intelligence feeds, and advanced detection techniques. Evaluate and respond to newly discovered vulnerabilities and attacker TTPs to improve detection and response measures. Participate in a rotating on-call schedule to maintain 24/7 cybersecurity coverage. Mentor and support less experienced SOC analysts, providing technical leadership and training. Lead proactive threat hunting activities based on internal risk factors and external intelligence. Develop and maintain forensic capabilities, tools, and procedures. Support Security Orchestration, Automation and Response (SOAR) tools, including administration and use case development. Create advanced search queries and detection content for SIEM platforms using scripting and custom logic. Build and enhance use cases by integrating log sources and developing correlation rules. Incorporate actionable threat intelligence into security platforms for proactive defense. Conduct forensic investigations in support of internal investigations and incident response. Translate adversary TTPs into indicators of compromise (IOCs) and detection logic. Lead post-incident reviews, document findings, and recommend improvements to prevent recurrence. Develop, refine, and maintain SOC metrics and operational playbooks. Evaluate existing security technologies and identify improvements to strengthen overall security posture. Collaborate across cybersecurity, infrastructure, and application teams to ensure cohesive defense strategies.
Required Technical Skills
Minimum 7+ years of experience in cybersecurity, with at least 4+ years focused on incident response. Certified Information Systems Security Professional (CISSP) required. At least two additional current certifications (e.g., CEH, GIAC, CCNA/CCNP, EnCE). Proficient in SIEM platforms and advanced event correlation analysis. Deep knowledge of network and application security, forensics, threat detection, and vulnerability management. Hands-on experience with SOAR platforms and automation pipelines. Familiarity with MITRE ATT&CK and the Cyber Kill Chain frameworks. Strong understanding of threat vectors such as DDoS, malware, phishing, port scans, and web attacks. Practical knowledge of defensive strategies and countermeasures for common exploits and vulnerabilities. Experience with forensic tools and investigation methodologies. Proficient in Linux, Windows, and command-line tools for log and evidence analysis. Strong scripting skills (Python, Bash, PowerShell, Perl). Ability to craft custom detections using YARA rules, regex, and query languages.
Required Education
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field; or equivalent experience.
Kavaliro provides Equal Employment Opportunities to all employees and applicants. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Kavaliro is committed to the full inclusion of all qualified individuals. In keeping with our commitment, Kavaliro will take the steps to assure that people with disabilities are provided reasonable accommodations. Accordingly, if reasonable accommodation is required to fully participate in the job application or interview process, to perform the essential functions of the position, and/or to receive all other benefits and privileges of employment, please respond to this posting to connect with a company representative.
Job Requirements
Hybrid Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries IT Services and IT Consulting Referrals increase your chances of interviewing at Kavaliro by 2x Sign in to set job alerts for “Security Operations Center Analyst” roles.
Security Assistant, Secret Clearance, Hourly - Orlando, FL
F-35 Info Sys Sec Officer, Orlando, FL - Mid-Career
F-35 Info Sys Sec Officer, Orlando, FL - Mid-Career
Greater Orlando $99,461.00-$128,329.00 1 week ago Network Security Engineer - Need only w2 or 1099
Network Security Specialist (Forensic Analyst)
Information Security Systems Engineer (ISSE)
Security Control Assessor Representative
GRC Specialist - Public Sector, IT Operations
Cloud Security Engineer - Public Sector, IT Operations
Senior Security Engineer, Security Assurance
Senior Cyber Security Engineer / CSET Lead
Lead Security Engineer - Security Assurance
Manufacturing Engineer-Security Clearance Eligibility Required
Senior Associate, Cyber Operations (shift work)
Senior Specialist, Identity and Access Management
IT Manager, Cyber Security and Emerging Technologies
Senior Specialist, Identity Access Management
Cyber SDC- M365 Security Operations Lead Engineer - Senior - Consulting - Location Open
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr