WPS—A health solutions company
Principal SOC Analyst
WPS—A health solutions company, Granite Heights, Wisconsin, United States
Get AI-powered advice on this job and more exclusive features.
Role Snapshot As a key member of the Security Operations Center (SOC), our Principal SOC Analyst serves as the first line of defense in WPS’s highly secure and regulatory-compliant environment, delivering innovative solutions. This senior analyst brings advanced cybersecurity expertise to lead and mentor other SOC analysts, develop and optimize monitoring tools, procedures, and ensure clear, effective communication with auditors and business stakeholders. The Principal SOC Analyst plays a critical role in guiding complex security initiatives, responding to incidents, and driving continuous improvement across SOC operations.
Salary Range $125,000 ~ $160,000
Work Location We prefer candidates residing in Wisconsin to take advantage of hybrid work. Employees within 45 miles of WPS Headquarters (1717 W. Broadway, Madison, WI) will be expected to engage in hybrid work three days a week. Secondary consideration is offered to remote workers in approved states:
Colorado, Florida, Georgia, Illinois, Indiana, Iowa, Michigan, Minnesota, Missouri, Nebraska, New Jersey, North Carolina, Ohio, South Carolina, Texas, Virginia, Wisconsin
How do I know this opportunity is right for me?
Enjoy leading security incident response by managing the end‑to‑end process, including preparation, detection, containment, eradication, recovery, and post‑incident analysis.
Have coordinated testing, simulations, and training exercises to ensure team readiness.
Like providing expert‑level guidance and mentorship to SOC analysts, fostering skill development, knowledge sharing, and continuous improvement in threat detection and response capabilities.
Thrive when designing, implementing, and maintaining SOC monitoring solutions, tools, and procedures to enhance threat visibility, detection accuracy, and operational efficiency.
Can represent the SOC function in audits, vendor discussions, cross‑functional meetings, and other engagements, ensuring clear communication of security posture and operational effectiveness.
Enjoy developing, reviewing, and maintaining comprehensive SOC documentation, including standard operating procedures (SOPs), incident handling playbooks, and monitoring protocols to support operational consistency and compliance.
Can serve in an on‑call capacity to support the Security Operations Center and Incident Response Manager during security incidents, ensuring timely escalation, coordination, and resolution of critical events outside regular business hours.
Minimum Qualifications
U.S. citizenship is required due to Department of Defense restrictions.
Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or related field, or equivalent education and relevant work experience.
7 or more years of progressive cybersecurity experience, with strong expertise in SOC activities, including incident detection, analysis, containment, and recovery in complex enterprise environments.
Security Operations Center experience that includes:
Proficient with SIEM platforms, including log correlation, alert tuning, and threat detection strategies.
Experienced in applying the MITRE ATT&CK framework and aligning security operations with standards such as NIST, CMMC, and MAC-ARS controls in regulated environments.
Solid technical background in network security, cloud security architectures (AWS, Azure), and emerging AI/ML security principles for threat mitigation and SOC automation.
Working knowledge of scripting languages (PowerShell, Python) and foundational skills in AI integration to enhance SOC processes.
Strong leadership, mentoring, and communication skills with the ability to engage technical and non‑technical stakeholders effectively.
Skilled in security policy development, technical documentation, and diagramming tools (Visio, Lucidchart).
Preferred Qualifications
Experience working on federal contracts in a highly security conscious environment, such as CMMC or MAC-ARS controls.
Industry certifications such as CISSP, CCSP, or CISM.
Remote Work Requirements
High‑speed cable or fiber internet.
Minimum 10 Mbps downstream and 1 Mbps upstream (verify via speedtest.net).
Review Remote Worker FAQs for additional information.
Benefits
Remote and hybrid work options available.
Performance bonus and/or merit increase opportunities.
401(k) with a 100 % match for the first 3 % of salary and a 50 % match for the next 2 % (100 % vested immediately).
Competitive paid time off.
Health, dental, and telehealth services start Day 1.
Professional and Leadership Development Programs.
Additional benefits available at https://www.wpshealthsolutions.com/careers/fulltime_benefits.shtml
#J-18808-Ljbffr
Role Snapshot As a key member of the Security Operations Center (SOC), our Principal SOC Analyst serves as the first line of defense in WPS’s highly secure and regulatory-compliant environment, delivering innovative solutions. This senior analyst brings advanced cybersecurity expertise to lead and mentor other SOC analysts, develop and optimize monitoring tools, procedures, and ensure clear, effective communication with auditors and business stakeholders. The Principal SOC Analyst plays a critical role in guiding complex security initiatives, responding to incidents, and driving continuous improvement across SOC operations.
Salary Range $125,000 ~ $160,000
Work Location We prefer candidates residing in Wisconsin to take advantage of hybrid work. Employees within 45 miles of WPS Headquarters (1717 W. Broadway, Madison, WI) will be expected to engage in hybrid work three days a week. Secondary consideration is offered to remote workers in approved states:
Colorado, Florida, Georgia, Illinois, Indiana, Iowa, Michigan, Minnesota, Missouri, Nebraska, New Jersey, North Carolina, Ohio, South Carolina, Texas, Virginia, Wisconsin
How do I know this opportunity is right for me?
Enjoy leading security incident response by managing the end‑to‑end process, including preparation, detection, containment, eradication, recovery, and post‑incident analysis.
Have coordinated testing, simulations, and training exercises to ensure team readiness.
Like providing expert‑level guidance and mentorship to SOC analysts, fostering skill development, knowledge sharing, and continuous improvement in threat detection and response capabilities.
Thrive when designing, implementing, and maintaining SOC monitoring solutions, tools, and procedures to enhance threat visibility, detection accuracy, and operational efficiency.
Can represent the SOC function in audits, vendor discussions, cross‑functional meetings, and other engagements, ensuring clear communication of security posture and operational effectiveness.
Enjoy developing, reviewing, and maintaining comprehensive SOC documentation, including standard operating procedures (SOPs), incident handling playbooks, and monitoring protocols to support operational consistency and compliance.
Can serve in an on‑call capacity to support the Security Operations Center and Incident Response Manager during security incidents, ensuring timely escalation, coordination, and resolution of critical events outside regular business hours.
Minimum Qualifications
U.S. citizenship is required due to Department of Defense restrictions.
Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or related field, or equivalent education and relevant work experience.
7 or more years of progressive cybersecurity experience, with strong expertise in SOC activities, including incident detection, analysis, containment, and recovery in complex enterprise environments.
Security Operations Center experience that includes:
Proficient with SIEM platforms, including log correlation, alert tuning, and threat detection strategies.
Experienced in applying the MITRE ATT&CK framework and aligning security operations with standards such as NIST, CMMC, and MAC-ARS controls in regulated environments.
Solid technical background in network security, cloud security architectures (AWS, Azure), and emerging AI/ML security principles for threat mitigation and SOC automation.
Working knowledge of scripting languages (PowerShell, Python) and foundational skills in AI integration to enhance SOC processes.
Strong leadership, mentoring, and communication skills with the ability to engage technical and non‑technical stakeholders effectively.
Skilled in security policy development, technical documentation, and diagramming tools (Visio, Lucidchart).
Preferred Qualifications
Experience working on federal contracts in a highly security conscious environment, such as CMMC or MAC-ARS controls.
Industry certifications such as CISSP, CCSP, or CISM.
Remote Work Requirements
High‑speed cable or fiber internet.
Minimum 10 Mbps downstream and 1 Mbps upstream (verify via speedtest.net).
Review Remote Worker FAQs for additional information.
Benefits
Remote and hybrid work options available.
Performance bonus and/or merit increase opportunities.
401(k) with a 100 % match for the first 3 % of salary and a 50 % match for the next 2 % (100 % vested immediately).
Competitive paid time off.
Health, dental, and telehealth services start Day 1.
Professional and Leadership Development Programs.
Additional benefits available at https://www.wpshealthsolutions.com/careers/fulltime_benefits.shtml
#J-18808-Ljbffr