Logo
Unisys

Senior SOC Security Engineer – Application Security Focus

Unisys, Rockville, Maryland, us, 20849

Save Job

Senior SOC Security Engineer – Application Security Focus Get AI-powered advice on this job and more exclusive features.

Direct message the job poster from Unisys

Talent Acquisition Lead @ Unisys India | Internet Recruiting Hiring: Senior SOC Security Engineer –(Network Security Focus) – Remote (DMV Area Preferred)

Location:

Remote – Candidates must reside in or be willing to relocate to the Washington DC, Maryland, or Virginia area

Schedule:

Shift-based (primarily 11AM–8PM or 11PM–8AM) | #TS-9035

Our client, an AWS partnered analytics organization, owns the world’s largest financial data store and runs continuous analytics on global stock data movement with the goal of being ahead of potential bad actors in the market.

We own the world’s largest financial store (37 petabytes and growing) and look at 155+ billion financial transactions daily— more than Twitter, Visa®, PayPal and Facebook combined.

Leading Innovator in Machine Learning/AI, Big Data, AWS, trading algorithms

AWS- select Partner: forging one of the biggest and most unique partnerships formed with AWS.

Deep culture of internal upskilling

Named 2020 #1 best place to work for US organizations with up to 5k employees.

Job Title: Senior SOC Security Engineer – (Network Security Focus)

Location:

Remote – Candidates must reside in or be willing to relocate to the Washington DC, Maryland, or Virginia area

Department: Security Operations Center (SOC)

About the Role

We’re seeking an experienced

SOC Security Engineer

with a strong background in

network security, incident response, and threat hunting

to join a fast-growing, highly technical cybersecurity team. This is a

hands-on

role — ideal for someone who thrives on investigating alerts, analyzing complex incidents, and strengthening detection and response capabilities in a hybrid cloud environment.

What You’ll Do

Monitor, triage, and respond to security alerts across multiple environments (on-prem and cloud).

Lead incident response activities, from detection through containment and remediation.

Analyze network logs, IDS/IPS alerts, and packet captures (Wireshark, tcpdump, Zeek, Suricata).

Develop detection rules, playbooks, and automation scripts for faster response.

Collaborate with infrastructure and cloud teams to secure hybrid environments.

Perform network forensics, threat hunting, and continuous tuning of SIEM and EDR tools.

Mentor junior analysts and help build a high-performing SOC capability.

What We’re Looking For

✅ 5+ years in SOC operations, cybersecurity monitoring, or incident response

✅ Hands-on with

SIEM tools

(Splunk, QRadar, Sentinel, or Elastic)

✅ Deep

network security

knowledge (IDS/IPS, firewalls, TCP/IP, DNS, VPNs, etc.)

✅ Experience with

EDR tools

(CrowdStrike, Carbon Black, McAfee, or Defender ATP)

✅ Scripting in

Python or PowerShell

for SOC automation and data analysis

✅ Cloud security exposure ( AWS ,

Azure , or

GCP )

✅ Strong communication and ability to independently handle technical investigations

Certifications such as

CEH, GCIA, GCIH, GNFA, or CISSP

are highly desirable

Why You’ll Love It Here

Work with an elite cybersecurity team preparing for a 24/7 SOC operation.

Remote flexibility (90% remote, with occasional DC-area meetings).

Exposure to diverse environments — network, endpoint, and cloud.

High-impact work where your technical decisions directly strengthen defense posture.

Interested?

Apply directly or message me to discuss your background in SOC engineering, incident response, and network security.

#J-18808-Ljbffr