OP Technology
This range is provided by OP Technology. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more.
Base pay range $100,000.00/yr - $115,000.00/yr
Direct message the job poster from OP Technology
Partner @ Oliver Parks | Mission Critical Engineering & Executive Supply Chain Headhunter. Lead Cybersecurity Analyst Compensation:
Up to $115,000 Base Salary
Schedule:
Monday–Friday, 8:00am–4:00pm CST
Our client, an award-winning MSSP, is seeking a skilled and motivated Lead Cybersecurity Analyst to guide Tier 2 SOC operations and elevate their cyber defense capabilities. This is a high-impact role for a hands‑on leader who excels in Microsoft Sentinel, KQL development, incident response, and mentoring SOC analysts.
Why This Role Matters
As the Lead Analyst, you will act as the primary escalation point for complex investigations, drive SOC readiness, and play a key role in shaping detection logic, alert fidelity, and overall security posture. You’ll have the opportunity to influence processes, train analysts, and lead during major cyber incidents.
Key Responsibilities
Provide daily direction and SME‑level support for Tier 2 SOC analysts
Act as the primary escalation point for complex alerts and investigations
Manage security ticket workflows and ensure SLA‑aligned escalations
Lead response efforts during high‑severity cyber incidents
Maintain continuous monitoring for threats impacting business operations
Review investigations for quality, accuracy, and documentation completeness
Build and maintain SOC runbooks, procedures, and response playbooks
Train Tier 2 analysts in Microsoft Sentinel, KQL, and investigative techniques
Improve detection logic, alert tuning, and use case fidelity
Support data source onboarding, sensor placement, and log coverage enhancements
Produce detailed and executive‑level reports on SOC activity and trends
Conduct threat trend analysis and recommend strategic improvements
Required Experience
5+ years of cybersecurity operations experience
Minimum 2 years in a Tier 2 or advanced SOC role
3+ years of Microsoft Sentinel experience
Strong proficiency in KQL query development, dashboards, and training others on Sentinel
Deep understanding of SOC operations, detection engineering, and incident response
Experience with SIEM, SOAR, EDR, IDS/IPS, and cloud‑native logging solutions
Strong communication skills, capable of producing both technical and executive‑level reports
Ability to stay calm, focused, and decisive during major incidents
Experience leading, mentoring, and developing SOC analysts
Preferred Certifications
Microsoft SC‑200 (required by end of Q4)
Microsoft SC‑100
Microsoft SC‑300
CISA 301
CompTIA CySA+
ISC2 CISSP
Standard hours: 8:00am–4:00pm CST, Monday–Friday
Join a high‑performing, award‑winning MSSP with a strong reputation for innovation and security excellence
If you’re passionate about elevating SOC operations, strengthening detection capabilities, and mentoring the next generation of cybersecurity analysts, this is an opportunity to make a lasting impact.
Interested? Get in touch and let’s discuss. tom@oliverparks.com
Seniority level Associate
Employment type Full‑time
Job function Information Technology
Industries: Technology, Information and Internet, IT Services and IT Consulting, and Utilities
Referrals increase your chances of interviewing at OP Technology by 2x
Sign in to set job alerts for “Cyber Security Analyst” roles. We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Base pay range $100,000.00/yr - $115,000.00/yr
Direct message the job poster from OP Technology
Partner @ Oliver Parks | Mission Critical Engineering & Executive Supply Chain Headhunter. Lead Cybersecurity Analyst Compensation:
Up to $115,000 Base Salary
Schedule:
Monday–Friday, 8:00am–4:00pm CST
Our client, an award-winning MSSP, is seeking a skilled and motivated Lead Cybersecurity Analyst to guide Tier 2 SOC operations and elevate their cyber defense capabilities. This is a high-impact role for a hands‑on leader who excels in Microsoft Sentinel, KQL development, incident response, and mentoring SOC analysts.
Why This Role Matters
As the Lead Analyst, you will act as the primary escalation point for complex investigations, drive SOC readiness, and play a key role in shaping detection logic, alert fidelity, and overall security posture. You’ll have the opportunity to influence processes, train analysts, and lead during major cyber incidents.
Key Responsibilities
Provide daily direction and SME‑level support for Tier 2 SOC analysts
Act as the primary escalation point for complex alerts and investigations
Manage security ticket workflows and ensure SLA‑aligned escalations
Lead response efforts during high‑severity cyber incidents
Maintain continuous monitoring for threats impacting business operations
Review investigations for quality, accuracy, and documentation completeness
Build and maintain SOC runbooks, procedures, and response playbooks
Train Tier 2 analysts in Microsoft Sentinel, KQL, and investigative techniques
Improve detection logic, alert tuning, and use case fidelity
Support data source onboarding, sensor placement, and log coverage enhancements
Produce detailed and executive‑level reports on SOC activity and trends
Conduct threat trend analysis and recommend strategic improvements
Required Experience
5+ years of cybersecurity operations experience
Minimum 2 years in a Tier 2 or advanced SOC role
3+ years of Microsoft Sentinel experience
Strong proficiency in KQL query development, dashboards, and training others on Sentinel
Deep understanding of SOC operations, detection engineering, and incident response
Experience with SIEM, SOAR, EDR, IDS/IPS, and cloud‑native logging solutions
Strong communication skills, capable of producing both technical and executive‑level reports
Ability to stay calm, focused, and decisive during major incidents
Experience leading, mentoring, and developing SOC analysts
Preferred Certifications
Microsoft SC‑200 (required by end of Q4)
Microsoft SC‑100
Microsoft SC‑300
CISA 301
CompTIA CySA+
ISC2 CISSP
Standard hours: 8:00am–4:00pm CST, Monday–Friday
Join a high‑performing, award‑winning MSSP with a strong reputation for innovation and security excellence
If you’re passionate about elevating SOC operations, strengthening detection capabilities, and mentoring the next generation of cybersecurity analysts, this is an opportunity to make a lasting impact.
Interested? Get in touch and let’s discuss. tom@oliverparks.com
Seniority level Associate
Employment type Full‑time
Job function Information Technology
Industries: Technology, Information and Internet, IT Services and IT Consulting, and Utilities
Referrals increase your chances of interviewing at OP Technology by 2x
Sign in to set job alerts for “Cyber Security Analyst” roles. We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr