TEKsystems
Get AI‑powered advice on this job and more exclusive features.
Aloha! One of Hawaii's largest health insurers is seeking an experienced SOC analyst to join their team. Ideally, the analyst will have strong expertise in security orchestration, automation, and response (SOAR). The role will contribute to the IT Security Team in an enterprise‑level environment by leveraging Microsoft Sentinel and automation capabilities to enhance the company's threat detection and incident response operations. Additionally, the analyst will aid in continuous improvement of security operations and provide mentorship to junior analysts. The position can sit fully remote, but the analyst must be able to work EST to overlap with HST and provide additional support outside of Hawaii hours.
Top Skills
4+ years hands‑on SOC experience
Proven experience with Microsoft Sentinel (workspace management, analytics rules, KQL queries, workbooks, incident management)
Ability to communicate effectively with development teams, vendors, and other stakeholders
Key Responsibilities
Monitor, analyze, and investigate complex security alerts and events using Microsoft Sentinel and integrated security tools
Design, develop, and maintain SOAR playbooks and automation workflows to streamline incident response processes
Perform in‑depth analysis of security incidents, including log correlation, threat hunting, and advanced analytics
Lead incident response efforts for medium to high‑severity security events, leveraging automated response capabilities
Create and optimize analytics rules, KQL queries, and detection logic within Microsoft Sentinel
Develop and refine SOAR workflows to reduce manual effort and improve response times
Conduct root‑cause analysis and provide detailed incident reports with remediation recommendations
Mentor junior SOC analysts on Microsoft Sentinel capabilities and best practices
Tune and optimize security orchestration workflows to minimize false positives and enhance detection accuracy
Stay current with emerging threats, SOAR technologies, and Microsoft Sentinel feature enhancements
Collaborate with IT, engineering, and stakeholders on security automation initiatives
Required Qualifications
Minimum 4 years of hands‑on experience in a SOC or security operations role
Active GIAC certification (GCIA, GCIH, GMON, GSEC, or other relevant GIAC credential)
Proven experience with Microsoft Sentinel (workspace management, analytics rules, KQL queries, workbooks, incident management)
Demonstrated expertise in MS‑Sentinel as SOAR and security automation (playbook development, workflow orchestration, API integrations)
Strong knowledge of Windows operating systems and/or network security (protocols, traffic analysis, network architecture)
Experience with scripting and automation languages (Python, PowerShell, KQL)
Deep understanding of the cyber kill chain, MITRE ATT&CK framework, and common attack methodologies
Proven ability to analyze and respond to security incidents independently
Strong analytical, critical‑thinking, and problem‑solving skills
Excellent written and verbal communication skills
Preferred Qualifications
Microsoft Security certifications (SC‑200: Microsoft Security Operations Analyst Associate)
Multiple GIAC certifications or other advanced security certifications (CISSP, CEH, OSCP)
Experience with Logic Apps, Azure Functions, or other Azure automation services
Knowledge of threat intelligence platforms and integration with Microsoft Sentinel
Experience with additional SOAR platforms (Palo Alto Cortex XSOAR, Splunk SOAR, etc.)
Proficiency with endpoint detection and response (EDR) tools, particularly Microsoft Defender
Experience with cloud security across Azure and other platforms (AWS, GCP)
Familiarity with digital forensics and malware analysis
Bachelor’s degree in Computer Science, Information Security, or related field
Job Type & Location This is a contract position based out of Honolulu, HI.
Pay And Benefits Pay range: $50.00 – $60.00 per hour.
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms.
Medical, dental & vision
Critical illness, accident, and hospital coverage
401(k) retirement plan – pre‑tax and Roth post‑tax contributions available
Life insurance (voluntary life & AD&D for the employee and dependents)
Short‑ and long‑term disability
Health spending account (HSA)
Transportation benefits
Employee assistance program
Time off/leave (PTO, vacation, or sick leave)
Workplace Type This is a hybrid position in Honolulu, HI.
Application Deadline Position is anticipated to close on 16 December 2025.
About TEKsystems We’re partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. TEKsystems is a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in full‑stack technology services, talent services, and real‑world application, we work with progressive leaders to drive change – that’s the power of true partnership.
TEKsystems is an equal‑opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
#J-18808-Ljbffr
Aloha! One of Hawaii's largest health insurers is seeking an experienced SOC analyst to join their team. Ideally, the analyst will have strong expertise in security orchestration, automation, and response (SOAR). The role will contribute to the IT Security Team in an enterprise‑level environment by leveraging Microsoft Sentinel and automation capabilities to enhance the company's threat detection and incident response operations. Additionally, the analyst will aid in continuous improvement of security operations and provide mentorship to junior analysts. The position can sit fully remote, but the analyst must be able to work EST to overlap with HST and provide additional support outside of Hawaii hours.
Top Skills
4+ years hands‑on SOC experience
Proven experience with Microsoft Sentinel (workspace management, analytics rules, KQL queries, workbooks, incident management)
Ability to communicate effectively with development teams, vendors, and other stakeholders
Key Responsibilities
Monitor, analyze, and investigate complex security alerts and events using Microsoft Sentinel and integrated security tools
Design, develop, and maintain SOAR playbooks and automation workflows to streamline incident response processes
Perform in‑depth analysis of security incidents, including log correlation, threat hunting, and advanced analytics
Lead incident response efforts for medium to high‑severity security events, leveraging automated response capabilities
Create and optimize analytics rules, KQL queries, and detection logic within Microsoft Sentinel
Develop and refine SOAR workflows to reduce manual effort and improve response times
Conduct root‑cause analysis and provide detailed incident reports with remediation recommendations
Mentor junior SOC analysts on Microsoft Sentinel capabilities and best practices
Tune and optimize security orchestration workflows to minimize false positives and enhance detection accuracy
Stay current with emerging threats, SOAR technologies, and Microsoft Sentinel feature enhancements
Collaborate with IT, engineering, and stakeholders on security automation initiatives
Required Qualifications
Minimum 4 years of hands‑on experience in a SOC or security operations role
Active GIAC certification (GCIA, GCIH, GMON, GSEC, or other relevant GIAC credential)
Proven experience with Microsoft Sentinel (workspace management, analytics rules, KQL queries, workbooks, incident management)
Demonstrated expertise in MS‑Sentinel as SOAR and security automation (playbook development, workflow orchestration, API integrations)
Strong knowledge of Windows operating systems and/or network security (protocols, traffic analysis, network architecture)
Experience with scripting and automation languages (Python, PowerShell, KQL)
Deep understanding of the cyber kill chain, MITRE ATT&CK framework, and common attack methodologies
Proven ability to analyze and respond to security incidents independently
Strong analytical, critical‑thinking, and problem‑solving skills
Excellent written and verbal communication skills
Preferred Qualifications
Microsoft Security certifications (SC‑200: Microsoft Security Operations Analyst Associate)
Multiple GIAC certifications or other advanced security certifications (CISSP, CEH, OSCP)
Experience with Logic Apps, Azure Functions, or other Azure automation services
Knowledge of threat intelligence platforms and integration with Microsoft Sentinel
Experience with additional SOAR platforms (Palo Alto Cortex XSOAR, Splunk SOAR, etc.)
Proficiency with endpoint detection and response (EDR) tools, particularly Microsoft Defender
Experience with cloud security across Azure and other platforms (AWS, GCP)
Familiarity with digital forensics and malware analysis
Bachelor’s degree in Computer Science, Information Security, or related field
Job Type & Location This is a contract position based out of Honolulu, HI.
Pay And Benefits Pay range: $50.00 – $60.00 per hour.
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms.
Medical, dental & vision
Critical illness, accident, and hospital coverage
401(k) retirement plan – pre‑tax and Roth post‑tax contributions available
Life insurance (voluntary life & AD&D for the employee and dependents)
Short‑ and long‑term disability
Health spending account (HSA)
Transportation benefits
Employee assistance program
Time off/leave (PTO, vacation, or sick leave)
Workplace Type This is a hybrid position in Honolulu, HI.
Application Deadline Position is anticipated to close on 16 December 2025.
About TEKsystems We’re partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. TEKsystems is a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in full‑stack technology services, talent services, and real‑world application, we work with progressive leaders to drive change – that’s the power of true partnership.
TEKsystems is an equal‑opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
#J-18808-Ljbffr