Qureos

Find The RightJob.

Senior Security Operations (SOC/CSIRT) Analyst

Job Title: Senior Security Operations (SOC/CSIRT) Analyst / Team Lead

Location: Remote (Global candidates welcome; must work U.S. business hours)
Employment Type: Full-Time

Salary Range: $130,000 – $145,000 (depending on experience)

About the Role

We are seeking an experienced Security Operations professional with a strong background in Security Operations Centers (SOC) and Computer Security Incident Response Teams (CSIRT). This role is hands-on and involves end-to-end ownership of complex cybersecurity incidents, as well as leadership responsibilities within a security operations environment.

The ideal candidate brings deep technical expertise, strong analytical capabilities, and the ability to operate effectively within U.S.-based teams and business environments.

Key Responsibilities

  • Lead and manage cybersecurity incident response efforts from detection through remediation
  • Perform advanced alert triage, investigation, and escalation within a SOC environment
  • Conduct detailed log analysis across Windows and Linux systems
  • Apply frameworks such as MITRE ATT&CK and Cyber Kill Chain to analyze threats
  • Collaborate with cross-functional teams to improve detection and response capabilities
  • Provide guidance and mentorship to junior analysts and SOC team members
  • Develop and refine incident response playbooks and processes
  • Communicate clearly with stakeholders, including technical and non-technical audiences

Required Qualifications

  • Proven, hands-on experience in SOC and/or CSIRT environments
  • Demonstrated experience managing complex cybersecurity incidents end-to-end
  • Advanced knowledge of:
  • Identity and access management, including Active Directory (AD)
  • Windows event logs (evtx) and system-level analysis
  • Multi-factor authentication (MFA)
  • Network protocols and traffic analysis
  • Common attack vectors and threat actor methodologies
  • Strong experience with log analysis (Windows/Linux)
  • Knowledge of Digital Forensics and Incident Response (DFIR)
  • Experience with security tools such as Splunk, CrowdStrike, Darktrace, Forescout, and Palo Alto NGFW
  • Prior team leadership or management experience
  • Excellent communication and stakeholder management skills
  • Professional fluency in English and Spanish (written and verbal)

Work Requirements

  • Must be available and consistently work during U.S. business hours
  • Must be comfortable working within U.S.-based teams and client environments
  • Strong understanding of U.S. workplace communication styles and expectations
  • Ability to collaborate effectively in a remote, multicultural environment

Compensation & Benefits

  • Base salary: $130,000 – $145,000
  • Health insurance reimbursement
  • Paid time off

Why Join Us

You will play a critical role in protecting enterprise environments by leading high-impact incident response efforts. This position offers the opportunity to work on complex security challenges while contributing to the growth and maturity of security operations programs.

To Apply: Please submit your resume along with a cover letter.

Pay: $130,000.00 - $145,000.00 per year

Benefits:

  • Health insurance
  • Paid time off

Application Question(s):

  • Describe a complex cybersecurity incident you handled end-to-end. Include your role, tools used, and outcome.
  • Which security tools have you used hands-on in production? (e.g., Splunk, CrowdStrike, Palo Alto, etc.)
  • What is you expected compensation rate?

Language:

  • both English and Spanish (written and verbal) (Required)

Work Location: Remote

© 2026 Qureos. All rights reserved.