Source Job

SOC Engineer II

IEM
US

  • Monitor, investigate, triage, and respond to security alerts.
  • Perform advanced network analysis and conduct log analysis.
  • Assist with EDR investigations and support the Incident Response Team.

SIEM EDR Security Networking

20 jobs similar to SOC Engineer II

Jobs ranked by similarity.

US

  • Lead incident response efforts for high-severity and complex security events.
  • Perform advanced threat analysis, including APT detection and analysis of threat actor tactics.
  • Lead continuous improvement initiatives for SOC processes, workflow automation, and detection coverage.

Brightspeed is providing fast, reliable internet connections and customer experience in twenty states throughout the Midwest and South. They are backed by funds managed by Apollo Global Management and are upgrading copper to fiber optic technologies.

$83,200–$124,800/hr

  • Review detection alerts, triage workflows, and escalation pathways
  • Evaluate completeness, accuracy, and quality of incident response actions
  • Identify gaps in logging, detection coverage, and containment logic

Alignerr is a recruiting company. The job posting does not contain information about company size, employee count or culture.

US

  • Monitor and analyze security alerts to identify potential threats.
  • Conduct proactive threat hunting across different environments.
  • Investigate security incidents and determine root cause.

Globe Life is committed to empowering employees with support and opportunities to succeed in their careers. They foster a caring and innovative culture that enables them to grow and overcome challenges in a connected and collaborative environment.

US

Monitor and analyze security events using SIEM platforms. Investigate and respond to alerts from XDR tools. Conduct proactive threat hunting across endpoints, networks, and cloud environments.

Since 1996, Numerix has provided expertise, analytics and software that redefine pricing and risk management in the financial markets, strengthening its leadership position.

$100,000–$130,000/yr
US

  • Monitor and triage security alerts, ensuring timely and accurate threat identification.
  • Act as a primary responder for security incidents, managing the full incident response lifecycle.
  • Develop and refine threat detection capabilities by incorporating threat intelligence.

Jobgether uses an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements.

$85,000–$100,000/yr
US

  • Secure client IT assets against cyber threats, including malware, ransomware, and unauthorized access attempts
  • Monitor and analyze security tools and logs to detect suspicious activity and potential incidents
  • Investigate, triage, and respond to security incidents, including containment and remediation activities

Stambaugh Ness (SN) is a professional services firm serving clients nationally with a singular focus on architecture, engineering, and related industries. Fast-paced and fast-growing, they have created a close-knit team that genuinely enjoys working together.

$64,938–$103,901/yr
US

  • Monitor alerts from security tools and work towards resolution.
  • Participate in incident response and perform incident reporting.
  • Collaborate with team members to develop SOC IR strategies.

CSG empowers companies to build unforgettable experiences, making it easier for people and businesses to connect with, use and pay for the services they value most. CSG's technologies and people have helped some of the world's most recognizable brands solve their toughest business challenges and evolve to meet the demands of today's digital economy.

$68,000–$68,000/yr
North America Europe Middle East APAC

  • Monitor and triage detection alerts and network telemetry generated by the Dragos Platform in customer environments.
  • Investigate suspicious activity and assist with identification of misconfigurations, anomalies, and potential malicious behaviors in OT networks.
  • Perform initial analysis, apply context, and escalate relevant findings to senior analysts and threat hunters with appropriate details and documentation.

Dragos is dedicated to arming its customers with best-in-class technology, threat intelligence, and services to protect their systems as effectively and efficiently as possible. They're a remote-first culture with operations in North America, Europe, the Middle East, and APAC with mission-oriented teammates.

$93,500–$126,500/yr
US Unlimited PTO

  • Monitor SIEM alerts, triage incidents, and escalate as needed to ensure timely resolution
  • Conduct third-party and supply chain risk management reviews, including audit report analysis
  • Collaborate with engineering, IT, and operations teams to integrate and maintain security controls

Jobgether uses an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. It identifies top-fitting candidates and shares this shortlist with the hiring company.

$20–$22/hr
Global

  • Monitor security alerts and events using SIEM and other monitoring tools.
  • Analyze and respond to security incidents, including malware infections, phishing attempts, and unauthorized access.
  • Triage and prioritize alerts based on severity and potential impact.

ATPCO is the world's primary source for air fare content, holding over 200 million fares across 160 countries. ATPCO believes in flexibility, trust, and a culture where your wellbeing comes first, offering open-door leadership and real-time recognition.

$156,000–$210,000/yr
US Canada

  • Design, build, and continuously improve threat detections across 1Password’s infrastructure, products, internal tools, and corporate environments.
  • Lead and support security incident response activities, including investigation, containment, remediation, and post-incident learning.
  • Collaborate with Security, Infrastructure, and IT teams to improve security visibility, logging quality, and response readiness.

1Password is building the foundation for a safe, productive digital future. They innovated the market-leading enterprise password manager and pioneered Extended Access Management, a new cybersecurity category built for the way people and AI agents work today. Over 180,000 businesses trust 1Password to help their teams securely adopt the SaaS and AI tools they need to do their best work.

$115,747–$208,344/yr
US 4w PTO

  • Monitor the daily operations of the team, being the primary liaison between analysts and leadership
  • Oversee response activities for security events and alerts associated with cyber threats, intrusions, or compromises
  • Be a mentor to Cyber Defense Analysts, providing feedback on the quality of work to analyst(s) and management

Experian is a global data and technology company, powering opportunities for people and businesses around the world. As a FTSE 100 Index company listed on the London Stock Exchange (EXPN), they have a team of 22,500 people across 32 countries and corporate headquarters in Dublin, Ireland.

Canada 4w PTO

As a Senior Incident Response Developer, you will investigate complex security incidents and build scalable response processes. You'll help enhance security incident response capabilities through relationships with Engineering teams. You will be involved in shaping the Security Incident Response team and acting as Incident Commander to resolve incidents.

Wealthsimple is on a mission to help everyone achieve financial freedom by reimagining what it means to manage your money.

$93,500–$126,500/yr
US Unlimited PTO

  • Advise tuning of SIEM correlation rules and use cases to identify security incidents and anomalies.
  • Monitor SIEM alerts, triage, and respond to security incidents in a timely manner, escalating as necessary to the appropriate team(s) for further investigation and remediation.
  • Perform Third Party/Supply Chain Risk Management reviews, to include security research and audit report analysis.

Defense Unicorns delivers mission value by streamlining software delivery so our customers can focus on the most important challenges. Our team is composed of innovators, software engineers, and veterans with decades of experience delivering technology programs across the federal market.

$119,000–$127,000/yr
US

  • Using Red Canary’s detection platform to analyze EDR telemetry, alerts, and log sources.
  • Researching coverage opportunities then creating new detectors, and tune existing ones.
  • Improving the Detection Engineering workflow through orchestration & automation.

Zscaler accelerates digital transformation, protecting customers from cyberattacks and data loss. They value transparency and constructive debate, building high-performing teams focused on customer obsession, collaboration, ownership, and accountability.

Europe

  • Lead the design, develop, and implementation of incident response playbooks.
  • Be part of a weekly on-call rotation and support in detection engineering.
  • Identify areas for security improvement and translate that into workable solutions.

Ping Identity's cloud identity platform enables secure and seamless digital experiences. They are headquartered in Denver, Colorado, with offices and employees around the globe, serving large enterprises.

$137,065–$160,000/yr
US

  • Oversee Endpoint Detection and Response (EDR) by guiding mid-level engineers in deploying and fine-tuning EDR solutions.
  • Lead Next-Generation Antivirus (NGAV) implementation by supervising the setup and configuration of behavioral-based protection.
  • Direct Threat & Vulnerability Management by overseeing continuous vulnerability assessments and providing remediation recommendations.

EXPANSIA is a service-disabled veteran-owned company that empowers organizations to be mission ready now with data, people, and ecosystems. As experts in continuous-delivery methods that drive digital adoption, they are dedicated to innovation, efficiency, and technology that benefit the warfighter.

$119,000–$127,000/yr
US

  • Using Red Canary’s detection platform to analyze EDR telemetry, alerts, and log sources.
  • Researching coverage opportunities then creating new detectors, and tune existing ones.
  • Improving the Detection Engineering workflow through orchestration & automation

Zscaler, founded in 2007, aims to make the cloud a safe place for business. They operate the world’s largest security cloud, using AI to protect enterprises from cyberattacks and data loss, fostering an inclusive and supportive culture.

Unlimited PTO

  • Monitor alerts and notifications from cloud services, security tools, and our SOC/MSSP partners.
  • Triage and analyze potential security incidents, determine severity and scope, and coordinate response and remediation.
  • Establish and enforce security standards, guidelines, and best practices across product, engineering, and IT.

Meshy is a leading 3D generative AI company on a mission to Unleash 3D Creativity by transforming the content creation pipeline, making it effortless for both professional artists and hobbyists to create unique 3D assets. Meshy's talent spans the globe and they are trusted by top developers.

US

  • You will be the expert for our Cortex portfolio, a Next-Gen AI-powered security operations platform.
  • You will play a key role in defining technical solutions that secure a customer’s key business imperatives.
  • You evangelize our industry leading solutions in Security Intelligence and Automation, XDR, Attack Surface Management, SOAR and Incident Response that establish Palo Alto Networks as a customer’s cybersecurity partner of choice.

Palo Alto Networks' mission is to be the cybersecurity partner of choice, protecting our digital way of life. They are a company built on challenging and disrupting the way things are done, and they’re looking for innovators who are as committed to shaping the future of cybersecurity as they are.