JLL
Overview
Senior Security Operations Center (SOC) Analyst, Threat Defense and Response
at JLL Technologies — United States / Remote. Jones Lang LaSalle, an international commercial real estate firm, is seeking a Senior SOC Analyst to respond to threats faced by the organization. This position is accountable for responding to alerts and incidents generated by JLL security controls and employee submissions, and for escalating identified critical issues to the Incident Response Team. The analyst supports Global Cyber Defense capabilities by responding to cyber threats and facilitates robust communications between other teams within the cybersecurity organization. The role reports to the Senior Director of Threat Defense and Response and interfaces with senior leaders including the global CISO, business lines, and technical engineers. A successful candidate will demonstrate leadership, attention to detail, and the ability to operate in a dynamic environment. Location: Remote — United States (with consideration for location-based nuances). Responsibilities
Respond to security control alerts and employee submissions; perform collection, triage, and analysis of evidence generated by JLL systems. Assist other SOC Analysts and Incident Responders while handling advanced attacks/incidents. Stay up to date with emerging threats and vulnerabilities to improve JLL's threat response capabilities. Track key metrics and continually improve the maturity and performance of the threat response program. Recommend controls and defensive measures to protect the organization from advanced threat actor tactics. Coordinate efforts to automate repeatable scenarios using SOAR playbooks and programming tools such as Python. Assist with defining, creating, and maintaining SIEM detection rules and dashboards. Qualifications
Experience & Education Bachelor's degree in information technology or Cybersecurity field (or equivalent experience). 1-3 years of Cybersecurity experience, preferably in a highly technical or SOC role. Strong ability to leverage automation, AI, and custom tooling to streamline response and data collection. Advanced working knowledge of cybersecurity prevention, detection, and response capabilities (e.g., AV, EDR, SIEM, digital forensics suites, IPS, WAF). Proficiency with multiple operating systems and cloud environments (Windows, Mac, Linux, Azure, GCP, AWS, O365). Familiarity with cybersecurity best practices, frameworks, and methodologies (NIST 800-53, ISO 27001, MITRE ATT&CK, CIS). Industry-recognized certifications or equivalent experience (e.g., BTL1, GSEC/GCFE/GCIA, GCIH, CEH). Excellent communication and collaboration skills. Technical Skills & Competencies Ability to respond to highly technical alerts and incidents; trace endpoints on the network from tickets or alerts. Familiarity with system log information and its implications. Understanding of common network services (web, mail, DNS, RDP, SFTP, etc.); general desktop and server OS knowledge. TCP/IP, Internet Routing, UNIX/Linux, Mac, and Windows. Ability to investigate and utilize SOAR; creating SOAR playbooks/automations is a plus. Experience in automation and AI usage in security incident response is a plus. Experience in programming with Python and JavaScript is a plus. Knowledge of SIEM, PCAP analysis, IDS/IPS, network monitoring tools, digital forensics, sandboxing, ticketing platforms, AV, EDR, and SOAR. Deep understanding of cyber-attacks, threat vectors, risk management, incident management, vulnerabilities, and zero-days. Compensation and Location
Estimated compensation:
140,000.00 - 192,000.00 USD per year This range is an estimate; final compensation depends on qualifications, location, market conditions, and internal considerations. Location:
Remote — United States Benefits
Personalized benefits that support well-being and growth: 401(k) plan with company matching Comprehensive Medical, Dental & Vision care Paid parental leave at 100% of salary Paid Time Off and Company Holidays Privacy and equal opportunity statements JLL is an Equal Opportunity Employer. See our Candidate Privacy Statement for details on how we process your personal data. If you need a reasonable accommodation, please contact accomodationrequest@am.jll.com. Applicants may be subject to background checks where legally required. Various state and local accommodations and disclosures apply. Pursuant to applicable laws, JLL and its affiliates comply with hiring and privacy requirements. For California residents, see the Supplemental Privacy Statement and related notices. This description is provided for ongoing applications.
#J-18808-Ljbffr
Senior Security Operations Center (SOC) Analyst, Threat Defense and Response
at JLL Technologies — United States / Remote. Jones Lang LaSalle, an international commercial real estate firm, is seeking a Senior SOC Analyst to respond to threats faced by the organization. This position is accountable for responding to alerts and incidents generated by JLL security controls and employee submissions, and for escalating identified critical issues to the Incident Response Team. The analyst supports Global Cyber Defense capabilities by responding to cyber threats and facilitates robust communications between other teams within the cybersecurity organization. The role reports to the Senior Director of Threat Defense and Response and interfaces with senior leaders including the global CISO, business lines, and technical engineers. A successful candidate will demonstrate leadership, attention to detail, and the ability to operate in a dynamic environment. Location: Remote — United States (with consideration for location-based nuances). Responsibilities
Respond to security control alerts and employee submissions; perform collection, triage, and analysis of evidence generated by JLL systems. Assist other SOC Analysts and Incident Responders while handling advanced attacks/incidents. Stay up to date with emerging threats and vulnerabilities to improve JLL's threat response capabilities. Track key metrics and continually improve the maturity and performance of the threat response program. Recommend controls and defensive measures to protect the organization from advanced threat actor tactics. Coordinate efforts to automate repeatable scenarios using SOAR playbooks and programming tools such as Python. Assist with defining, creating, and maintaining SIEM detection rules and dashboards. Qualifications
Experience & Education Bachelor's degree in information technology or Cybersecurity field (or equivalent experience). 1-3 years of Cybersecurity experience, preferably in a highly technical or SOC role. Strong ability to leverage automation, AI, and custom tooling to streamline response and data collection. Advanced working knowledge of cybersecurity prevention, detection, and response capabilities (e.g., AV, EDR, SIEM, digital forensics suites, IPS, WAF). Proficiency with multiple operating systems and cloud environments (Windows, Mac, Linux, Azure, GCP, AWS, O365). Familiarity with cybersecurity best practices, frameworks, and methodologies (NIST 800-53, ISO 27001, MITRE ATT&CK, CIS). Industry-recognized certifications or equivalent experience (e.g., BTL1, GSEC/GCFE/GCIA, GCIH, CEH). Excellent communication and collaboration skills. Technical Skills & Competencies Ability to respond to highly technical alerts and incidents; trace endpoints on the network from tickets or alerts. Familiarity with system log information and its implications. Understanding of common network services (web, mail, DNS, RDP, SFTP, etc.); general desktop and server OS knowledge. TCP/IP, Internet Routing, UNIX/Linux, Mac, and Windows. Ability to investigate and utilize SOAR; creating SOAR playbooks/automations is a plus. Experience in automation and AI usage in security incident response is a plus. Experience in programming with Python and JavaScript is a plus. Knowledge of SIEM, PCAP analysis, IDS/IPS, network monitoring tools, digital forensics, sandboxing, ticketing platforms, AV, EDR, and SOAR. Deep understanding of cyber-attacks, threat vectors, risk management, incident management, vulnerabilities, and zero-days. Compensation and Location
Estimated compensation:
140,000.00 - 192,000.00 USD per year This range is an estimate; final compensation depends on qualifications, location, market conditions, and internal considerations. Location:
Remote — United States Benefits
Personalized benefits that support well-being and growth: 401(k) plan with company matching Comprehensive Medical, Dental & Vision care Paid parental leave at 100% of salary Paid Time Off and Company Holidays Privacy and equal opportunity statements JLL is an Equal Opportunity Employer. See our Candidate Privacy Statement for details on how we process your personal data. If you need a reasonable accommodation, please contact accomodationrequest@am.jll.com. Applicants may be subject to background checks where legally required. Various state and local accommodations and disclosures apply. Pursuant to applicable laws, JLL and its affiliates comply with hiring and privacy requirements. For California residents, see the Supplemental Privacy Statement and related notices. This description is provided for ongoing applications.
#J-18808-Ljbffr