Sorenson Communications, LLC
As a Senior SOC Analyst, you will serve as a senior lead responsible for monitoring, investigating, and responding to security threats. This role will focus on leading security investigations, incident response processes, threat detection, and security control validation to ensure a strong security posture across the organization. In addition, you will also be responsible for assessing MSSP performance, tuning security controls, and validating security technologies such as firewalls, cloud security configurations, and endpoint security solutions.
Essential Duties and Responsibilities
Oversee internal and external SOC resources (MSSP or internal teams), ensuring seamless collaboration, alignment and effective threat response.
Define and manage SOC and Incident Response workflows, processes, and escalation procedures to maintain operational efficiency.
Implement and maintain SOC and IR playbooks, runbooks, and automation to improve response times and reduce manual effort.
Actively monitor security logs, SIEM alerts, and endpoint detections to identify potential threats.
Lead and manage security investigations, ensuring accurate root cause analysis and timely mitigation.
Manage and enhance incident response (IR) processes, including triage, containment, eradication, and recovery efforts.
Leverage MITRE ATT&CK and similar frameworks to map incidents, assess gaps, and develop new detection logic.
Conduct forensic analysis, malware investigations, and threat hunting to identify indicators of compromise (IOCs) and emerging threats.
Utilize SOAR (Security Orchestration, Automation, and Response) platforms to automate response actions and improve incident handling efficiency.
Investigate security incidents and recommend remediation actions to IT and business units.
Work with security engineers to fine-tune SIEM correlation rules and alerting logic.
Integrate external threat intelligence feeds into security monitoring tools and enhance threat detection and response capabilities.
Conduct threat-hunting exercises to detect malicious activity not flagged by traditional monitoring.
Track emerging threats, zero-day vulnerabilities, security advisories, adversary tactics, and security trends relevant to our environment. Provide executive reporting on incident trends, SOC effectiveness, and security improvements.
Participate in red teaming and blue teaming and IR exercises.
Vulnerability Management & Compliance
Support vulnerability scanning and analysis, ensuring full visibility into security gaps.
Collaborate with IT teams to enforce patch compliance, particularly for critical and high-severity vulnerabilities.
Provide reports on vulnerability trends, security risks, and remediation progress.
Track and document compliance metrics such as Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR).
Conduct firewall rule reviews, cloud security assessments, and network security testing.
Evaluate SIEM rules, endpoint security configurations, and cloud security controls for misconfigurations.
Support vulnerability management efforts, ensuring timely remediation of identified risks.
Assist in evaluating and testing new security tools, integrating them into SOC workflows.
MSSP Oversight & Performance Management
Act as a primary escalation point for MSSP investigations, ensuring appropriate response times and quality.
Continuously assess MSSP effectiveness, ensuring SLAs and contractual obligations are met.
Provide feedback on SOC detections, response procedures, and incident reporting from the MSSP.
Partner with vendors to optimize security monitoring tools and improve detection logic.
Other duties as assigned
Education Minimum of 4 Year / Bachelors Degree In related field
Preferred Certification
CompTIA Security+, CEH (Certified Ethical Hacker), or GCIH (GIAC Certified Incident Handler), or GCIA (GIAC Certified Intrusion Analyst)
CISSP (Certified Information Systems Security Professional) or CISM (Certified Information Security Manager) or SOC Analyst-focused certifications
AWS/Azure security certifications
Required Qualifications (Knowledge and Experience)
7+ years of experience in Security Operations, Incident Response, and Threat Detection.
3+ years leading cybersecurity investigations, incident handling, and response coordination.
3+ years of experience managing and working with MSSPs, ensuring effective threat monitoring and response.
Knowledge, Skills, and Abilities
Extensive Experience with SIEM solutions (i.e. DataSet, Splunk, Elastic, etc.)
Extensive Experience managing/EDR solutions (SentinelOne, CrowdStrike, Microsoft Defender ATP)
Familiarity with Rapid7 or similar vulnerability management platforms
Basic scripting (Python, PowerShell, Bash) for security automation
Deep understanding of MITRE ATT&CK, NIST CSF, and incident response frameworks
Deep understanding of network security, system hardening, and vulnerability management
Hands-on experience with forensics, log analysis, and threat-hunting methodologies
Hands-on experience with firewall reviews, cloud security validation, and SIEM tuning
Proficiency with forensics, malware analysis, and threat-hunting methodologies
Strong analytical and investigative skills with expertise in log analysis, threat correlation, and anomaly detection
Strong communication skills with the ability to work across IT, legal, and executive teams
Ability to work independently and in a fast-paced environment
Strong project management and leadership abilities with a focus on collaboration and continuous improvement.
A strong team player with a good attitude
Highly self-motivated and directed
Keen attention to detail
Ability to effectively prioritize and execute tasks in a high-pressure environment
Come be a part of our mission and make a meaningful and positive impact with the industry leading provider of language services for the Deaf and hard-of-hearing!
Paid Vacation Time and Paid Sick Time and Paid Holidays
401k 6% match with immediate vesting
Nationwide Medical Insurance plans and coverage (Medical, Dental/Orthodontia, Vision)
TeleDoc
HSA company match
3 Medical plan options including a Low Deductible PPO Medical Plan Offering
Employee Assistance Program
Engaged Employee Resource Groups
Outstanding Learning and Career Development Opportunities
Pay Range Actual pay may vary up or down depending on job-related factors which may include knowledge, skills, experience, and location. In addition, this position may be eligible for incentive compensation.
* Applicants must be legally eligible to work in the United States to be considered. Visa sponsorship is not available for this role *
Company Summary Our Mission …Harnessing the power of language, we connect diverse people and enrich the human experience.
Our Vision …To provide global language services that expand opportunities, nurture belonging, and empower the world to connect beyond words.
As one of the world’s leading language services providers, Sorenson combines patented technology with human-centric solutions. We strive to increase accessibility and inclusion through communication solutions for all: call captioning and video relay services, over-video and in-person sign language and spoken language interpreting, translation, real-time captioning, and post-production language services. Sorenson’s impact vision and plan extends to enhancing generational wealth and inclusive workplaces for our employees and the communities we serve.
We achieve great things together working “The Sorenson Way” with our employee values: Customer First, Can-Do Attitude, Collective Action, Growth Mindset, Ownership, and Connect Direct.
Equal Employment Opportunity Sorenson Communications is an Equal Opportunity, ... and affirmative action employer. We provide remote-hiring access for 65% of roles.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
This employer is required to notify all applicants of their rights pursuant to federal employment laws. For further information, please review the Know Your Rights notice from the Department of Labor.
#J-18808-Ljbffr
Essential Duties and Responsibilities
Oversee internal and external SOC resources (MSSP or internal teams), ensuring seamless collaboration, alignment and effective threat response.
Define and manage SOC and Incident Response workflows, processes, and escalation procedures to maintain operational efficiency.
Implement and maintain SOC and IR playbooks, runbooks, and automation to improve response times and reduce manual effort.
Actively monitor security logs, SIEM alerts, and endpoint detections to identify potential threats.
Lead and manage security investigations, ensuring accurate root cause analysis and timely mitigation.
Manage and enhance incident response (IR) processes, including triage, containment, eradication, and recovery efforts.
Leverage MITRE ATT&CK and similar frameworks to map incidents, assess gaps, and develop new detection logic.
Conduct forensic analysis, malware investigations, and threat hunting to identify indicators of compromise (IOCs) and emerging threats.
Utilize SOAR (Security Orchestration, Automation, and Response) platforms to automate response actions and improve incident handling efficiency.
Investigate security incidents and recommend remediation actions to IT and business units.
Work with security engineers to fine-tune SIEM correlation rules and alerting logic.
Integrate external threat intelligence feeds into security monitoring tools and enhance threat detection and response capabilities.
Conduct threat-hunting exercises to detect malicious activity not flagged by traditional monitoring.
Track emerging threats, zero-day vulnerabilities, security advisories, adversary tactics, and security trends relevant to our environment. Provide executive reporting on incident trends, SOC effectiveness, and security improvements.
Participate in red teaming and blue teaming and IR exercises.
Vulnerability Management & Compliance
Support vulnerability scanning and analysis, ensuring full visibility into security gaps.
Collaborate with IT teams to enforce patch compliance, particularly for critical and high-severity vulnerabilities.
Provide reports on vulnerability trends, security risks, and remediation progress.
Track and document compliance metrics such as Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR).
Conduct firewall rule reviews, cloud security assessments, and network security testing.
Evaluate SIEM rules, endpoint security configurations, and cloud security controls for misconfigurations.
Support vulnerability management efforts, ensuring timely remediation of identified risks.
Assist in evaluating and testing new security tools, integrating them into SOC workflows.
MSSP Oversight & Performance Management
Act as a primary escalation point for MSSP investigations, ensuring appropriate response times and quality.
Continuously assess MSSP effectiveness, ensuring SLAs and contractual obligations are met.
Provide feedback on SOC detections, response procedures, and incident reporting from the MSSP.
Partner with vendors to optimize security monitoring tools and improve detection logic.
Other duties as assigned
Education Minimum of 4 Year / Bachelors Degree In related field
Preferred Certification
CompTIA Security+, CEH (Certified Ethical Hacker), or GCIH (GIAC Certified Incident Handler), or GCIA (GIAC Certified Intrusion Analyst)
CISSP (Certified Information Systems Security Professional) or CISM (Certified Information Security Manager) or SOC Analyst-focused certifications
AWS/Azure security certifications
Required Qualifications (Knowledge and Experience)
7+ years of experience in Security Operations, Incident Response, and Threat Detection.
3+ years leading cybersecurity investigations, incident handling, and response coordination.
3+ years of experience managing and working with MSSPs, ensuring effective threat monitoring and response.
Knowledge, Skills, and Abilities
Extensive Experience with SIEM solutions (i.e. DataSet, Splunk, Elastic, etc.)
Extensive Experience managing/EDR solutions (SentinelOne, CrowdStrike, Microsoft Defender ATP)
Familiarity with Rapid7 or similar vulnerability management platforms
Basic scripting (Python, PowerShell, Bash) for security automation
Deep understanding of MITRE ATT&CK, NIST CSF, and incident response frameworks
Deep understanding of network security, system hardening, and vulnerability management
Hands-on experience with forensics, log analysis, and threat-hunting methodologies
Hands-on experience with firewall reviews, cloud security validation, and SIEM tuning
Proficiency with forensics, malware analysis, and threat-hunting methodologies
Strong analytical and investigative skills with expertise in log analysis, threat correlation, and anomaly detection
Strong communication skills with the ability to work across IT, legal, and executive teams
Ability to work independently and in a fast-paced environment
Strong project management and leadership abilities with a focus on collaboration and continuous improvement.
A strong team player with a good attitude
Highly self-motivated and directed
Keen attention to detail
Ability to effectively prioritize and execute tasks in a high-pressure environment
Come be a part of our mission and make a meaningful and positive impact with the industry leading provider of language services for the Deaf and hard-of-hearing!
Paid Vacation Time and Paid Sick Time and Paid Holidays
401k 6% match with immediate vesting
Nationwide Medical Insurance plans and coverage (Medical, Dental/Orthodontia, Vision)
TeleDoc
HSA company match
3 Medical plan options including a Low Deductible PPO Medical Plan Offering
Employee Assistance Program
Engaged Employee Resource Groups
Outstanding Learning and Career Development Opportunities
Pay Range Actual pay may vary up or down depending on job-related factors which may include knowledge, skills, experience, and location. In addition, this position may be eligible for incentive compensation.
* Applicants must be legally eligible to work in the United States to be considered. Visa sponsorship is not available for this role *
Company Summary Our Mission …Harnessing the power of language, we connect diverse people and enrich the human experience.
Our Vision …To provide global language services that expand opportunities, nurture belonging, and empower the world to connect beyond words.
As one of the world’s leading language services providers, Sorenson combines patented technology with human-centric solutions. We strive to increase accessibility and inclusion through communication solutions for all: call captioning and video relay services, over-video and in-person sign language and spoken language interpreting, translation, real-time captioning, and post-production language services. Sorenson’s impact vision and plan extends to enhancing generational wealth and inclusive workplaces for our employees and the communities we serve.
We achieve great things together working “The Sorenson Way” with our employee values: Customer First, Can-Do Attitude, Collective Action, Growth Mindset, Ownership, and Connect Direct.
Equal Employment Opportunity Sorenson Communications is an Equal Opportunity, ... and affirmative action employer. We provide remote-hiring access for 65% of roles.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
This employer is required to notify all applicants of their rights pursuant to federal employment laws. For further information, please review the Know Your Rights notice from the Department of Labor.
#J-18808-Ljbffr