TEKsystems c/o Allegis Group
Aloha! One of Hawaii’s largest health insurers is seeking an experienced SOC analyst to join their team! Ideally, this person will have strong expertise in security orchestration, automation, and response (SOAR). This position will contribute to the IT Security Team in an enterprise level environment by leveraging Microsoft Sentinel and automation capabilities to enhance the company’s threat detection and incident response operations. Additionally, he/she will aid in continuous improvement of security operations and provide mentorship to some of the more junior analysts as well. This position can sit fully remote but he/she must be able to work EST to allow overlap with HST, and provide additional support/coverage outside of Hawaii hours.
Top Skills
4+ years hands‑on SOC experience
Proven experience with Microsoft Sentinel (workspace management, analytics rules, KQL queries, workbooks, and incident management)
Key Responsibilities
Monitor, analyze, and investigate complex security alerts and events using Microsoft Sentinel and integrated security tools
Design, develop, and maintain SOAR playbooks and automation workflows to streamline incident response processes
Perform in‑depth analysis of security incidents, including log correlation, threat hunting, and advanced analytics
Lead incident response efforts for medium to high‑severity security events, leveraging automated response capabilities
Create and optimize analytics rules, KQL queries, and detection logic within Microsoft Sentinel
Develop and refine SOAR workflows to reduce manual effort and improve response times
Conduct root cause analysis and provide detailed incident reports with remediation recommendations
Mentor junior SOC analysts on Microsoft Sentinel capabilities and best practices
Tune and optimize security orchestration workflows to minimize false positives and enhance detection accuracy
Stay current with emerging threats, SOAR technologies, and Microsoft Sentinel feature enhancements
Collaborate with IT, engineering, and stakeholders on security automation initiatives
Required Qualifications
Minimum 4 years of hands‑on experience in a SOC or security operations role
Active GIAC certification (GCIA, GCIH, GMON, GSEC, or other relevant GIAC credential)
Proven experience with Microsoft Sentinel (workspace management, analytics rules, KQL queries, workbooks, and incident management)
Demonstrated expertise in MS‑Sentinel as SOAR and security automation (playbook development, workflow orchestration, API integrations)
Strong knowledge of Windows operating systems and/or network security (protocols, traffic analysis, network architecture)
Experience with scripting and automation languages (Python, PowerShell, KQL)
Deep understanding of the cyber kill chain, MITRE ATT&CK framework, and common attack methodologies
Proven ability to analyze and respond to security incidents independently
Strong analytical, critical thinking, and problem‑solving skills
Excellent written and verbal communication skills
Preferred Qualifications
Microsoft Security certifications (SC-200: Microsoft Security Operations Analyst Associate)
Multiple GIAC certifications or other advanced security certifications (CISSP, CEH, OSCP)
Experience with Logic Apps, Azure Functions, or other Azure automation services
Knowledge of threat intelligence platforms and integration with Microsoft Sentinel
Experience with additional SOAR platforms (Palo Alto Cortex XSOAR, Splunk SOAR, etc.)
Proficiency with endpoint detection and response (EDR) tools, particularly Microsoft Defender
Experience with cloud security across Azure and other platforms (AWS, Google Cloud Platform)
Familiarity with digital forensics and malware analysis
Bachelor’s degree in Computer Science, Information Security, or related field
Job Type & Location This is a contract position based out of Honolulu, HI.
Pay and Benefits The pay range for this position is $50.00 – $60.00/hr.
Medical, dental & vision
Critical Illness, Accident, and Hospital
401(k) Retirement Plan – Pre‑tax and Roth post‑tax contributions available
Life Insurance (Voluntary Life & AD&D for the employee and dependents)
Short and long‑term disability
Health Spending Account (HSA)
Transportation benefits
Employee Assistance Program
Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type This is a hybrid position in Honolulu, HI.
Application Deadline This position is anticipated to close on Dec 16, 2025.
Equal Opportunity Statement The company is an equal‑opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
#J-18808-Ljbffr
Top Skills
4+ years hands‑on SOC experience
Proven experience with Microsoft Sentinel (workspace management, analytics rules, KQL queries, workbooks, and incident management)
Key Responsibilities
Monitor, analyze, and investigate complex security alerts and events using Microsoft Sentinel and integrated security tools
Design, develop, and maintain SOAR playbooks and automation workflows to streamline incident response processes
Perform in‑depth analysis of security incidents, including log correlation, threat hunting, and advanced analytics
Lead incident response efforts for medium to high‑severity security events, leveraging automated response capabilities
Create and optimize analytics rules, KQL queries, and detection logic within Microsoft Sentinel
Develop and refine SOAR workflows to reduce manual effort and improve response times
Conduct root cause analysis and provide detailed incident reports with remediation recommendations
Mentor junior SOC analysts on Microsoft Sentinel capabilities and best practices
Tune and optimize security orchestration workflows to minimize false positives and enhance detection accuracy
Stay current with emerging threats, SOAR technologies, and Microsoft Sentinel feature enhancements
Collaborate with IT, engineering, and stakeholders on security automation initiatives
Required Qualifications
Minimum 4 years of hands‑on experience in a SOC or security operations role
Active GIAC certification (GCIA, GCIH, GMON, GSEC, or other relevant GIAC credential)
Proven experience with Microsoft Sentinel (workspace management, analytics rules, KQL queries, workbooks, and incident management)
Demonstrated expertise in MS‑Sentinel as SOAR and security automation (playbook development, workflow orchestration, API integrations)
Strong knowledge of Windows operating systems and/or network security (protocols, traffic analysis, network architecture)
Experience with scripting and automation languages (Python, PowerShell, KQL)
Deep understanding of the cyber kill chain, MITRE ATT&CK framework, and common attack methodologies
Proven ability to analyze and respond to security incidents independently
Strong analytical, critical thinking, and problem‑solving skills
Excellent written and verbal communication skills
Preferred Qualifications
Microsoft Security certifications (SC-200: Microsoft Security Operations Analyst Associate)
Multiple GIAC certifications or other advanced security certifications (CISSP, CEH, OSCP)
Experience with Logic Apps, Azure Functions, or other Azure automation services
Knowledge of threat intelligence platforms and integration with Microsoft Sentinel
Experience with additional SOAR platforms (Palo Alto Cortex XSOAR, Splunk SOAR, etc.)
Proficiency with endpoint detection and response (EDR) tools, particularly Microsoft Defender
Experience with cloud security across Azure and other platforms (AWS, Google Cloud Platform)
Familiarity with digital forensics and malware analysis
Bachelor’s degree in Computer Science, Information Security, or related field
Job Type & Location This is a contract position based out of Honolulu, HI.
Pay and Benefits The pay range for this position is $50.00 – $60.00/hr.
Medical, dental & vision
Critical Illness, Accident, and Hospital
401(k) Retirement Plan – Pre‑tax and Roth post‑tax contributions available
Life Insurance (Voluntary Life & AD&D for the employee and dependents)
Short and long‑term disability
Health Spending Account (HSA)
Transportation benefits
Employee Assistance Program
Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type This is a hybrid position in Honolulu, HI.
Application Deadline This position is anticipated to close on Dec 16, 2025.
Equal Opportunity Statement The company is an equal‑opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
#J-18808-Ljbffr