Logo
OP Technology

Lead Cybersecurity Analyst

OP Technology, San Antonio, Texas, United States, 78208

Save Job

This range is provided by OP Technology. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more.

Base pay range $100,000.00/yr - $115,000.00/yr

Direct message the job poster from OP Technology

Partner @ Oliver Parks | Mission Critical Engineering & Executive Supply Chain Headhunter. Lead Cybersecurity Analyst Compensation:

Up to $115,000 Base Salary

Schedule:

Monday–Friday, 8:00am–4:00pm CST

Our client, an award-winning MSSP, is seeking a skilled and motivated Lead Cybersecurity Analyst to guide Tier 2 SOC operations and elevate their cyber defense capabilities. This is a high-impact role for a hands‑on leader who excels in Microsoft Sentinel, KQL development, incident response, and mentoring SOC analysts.

Why This Role Matters

As the Lead Analyst, you will act as the primary escalation point for complex investigations, drive SOC readiness, and play a key role in shaping detection logic, alert fidelity, and overall security posture. You’ll have the opportunity to influence processes, train analysts, and lead during major cyber incidents.

Key Responsibilities

Provide daily direction and SME‑level support for Tier 2 SOC analysts

Act as the primary escalation point for complex alerts and investigations

Manage security ticket workflows and ensure SLA‑aligned escalations

Lead response efforts during high‑severity cyber incidents

Maintain continuous monitoring for threats impacting business operations

Review investigations for quality, accuracy, and documentation completeness

Build and maintain SOC runbooks, procedures, and response playbooks

Train Tier 2 analysts in Microsoft Sentinel, KQL, and investigative techniques

Improve detection logic, alert tuning, and use case fidelity

Support data source onboarding, sensor placement, and log coverage enhancements

Produce detailed and executive‑level reports on SOC activity and trends

Conduct threat trend analysis and recommend strategic improvements

Required Experience

5+ years of cybersecurity operations experience

Minimum 2 years in a Tier 2 or advanced SOC role

3+ years of Microsoft Sentinel experience

Strong proficiency in KQL query development, dashboards, and training others on Sentinel

Deep understanding of SOC operations, detection engineering, and incident response

Experience with SIEM, SOAR, EDR, IDS/IPS, and cloud‑native logging solutions

Strong communication skills, capable of producing both technical and executive‑level reports

Ability to stay calm, focused, and decisive during major incidents

Experience leading, mentoring, and developing SOC analysts

Preferred Certifications

Microsoft SC‑200 (required by end of Q4)

Microsoft SC‑100

Microsoft SC‑300

CISA 301

CompTIA CySA+

ISC2 CISSP

Standard hours: 8:00am–4:00pm CST, Monday–Friday

Join a high‑performing, award‑winning MSSP with a strong reputation for innovation and security excellence

If you’re passionate about elevating SOC operations, strengthening detection capabilities, and mentoring the next generation of cybersecurity analysts, this is an opportunity to make a lasting impact.

Interested? Get in touch and let’s discuss. tom@oliverparks.com

Seniority level Associate

Employment type Full‑time

Job function Information Technology

Industries: Technology, Information and Internet, IT Services and IT Consulting, and Utilities

Referrals increase your chances of interviewing at OP Technology by 2x

Sign in to set job alerts for “Cyber Security Analyst” roles. We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr