KR
SOC Analyst
KTek Resourcing
Dallas · On-site Full-time Senior Today
About the role
About
We are looking for an experienced SOC Analyst to anchor our Security Operations function within a managed services environment. This is a senior, client-facing role combining deep technical expertise in threat detection and vulnerability management with the leadership capability to drive service excellence across a cross-functional delivery team.
Key Responsibilities
Security operations & incident management
- Own end-to-end SOC operations — monitoring, triage, escalation, and closure across assigned accounts
- Lead P1/P2 security incident bridges — coordinating technical response, client communication, and executive reporting simultaneously
- Drive post-incident RCA and feed findings back into detection rules and runbooks
- Maintain and continuously improve the SOC runbook library
- Define and enforce SLA targets for detection, containment, and response
Vulnerability management — Qualys
- Own the vulnerability management programme — scan scheduling, asset coverage, findings triage, and remediation tracking
- Configure and govern Qualys scan policies, asset groups, and reporting templates aligned to client risk appetite
- Produce executive and operational vulnerability reports — translating CVSS scores into prioritised remediation plans
- Define and enforce vulnerability SLAs by severity tier (Critical, High, Medium)
- Own the exception register and risk acceptance process
- Drive continuous improvement of scan coverage — agent deployment gaps, credential scan gaps
Threat detection & platform — Palo Alto XSIAM/ Trellix
- Operate and govern XSIAM as the primary SIEM/SOAR platform — ingestion config, data source onboarding, parser management
- Build, tune, and maintain detection rules and correlation logic
- Develop and manage SOAR playbooks for automated response — enrichment, containment, ticketing integration
- Conduct threat hunting exercises using MITRE ATT&CK as the reference framework
- Maintain XSIAM dashboards for both operational and executive audiences
Endpoint security — Trellix & Microsoft Defender (MDE)
- Govern EDR across the estate using Trellix and MDE — coverage, policy compliance, agent health
- Configure and tune Trellix policies — threat prevention rules, containment actions, SIEM integration
- Manage MDE deployment — onboarding, alert suppression, custom KQL detection rules
- Coordinate endpoint isolation, forensic investigation, and remediation workflows
- Track and report on endpoint protection coverage, driving remediation of gaps
Threat management & intelligence
- Lead the threat intelligence function — consuming feeds, contextualising IOCs, translating into actionable detections
- Conduct regular threat landscape reviews and present findings in governance forums
- Map SOC coverage against MITRE ATT&CK — identifying detection gaps
- Maintain a threat register with current actor profiles and defensive recommendations
Process design & governance
- Design, document, and own SOC processes — incident response, vulnerability management, change control, escalation workflows
- Establish and run monthly SOC governance reviews — SLA performance, incident trends, threat posture
- Define and track SOC KPIs — MTTD, MTTR, false positive rate, vulnerability remediation SLA compliance
- Own the SOC tool stack governance — version management, health monitoring, integration integrity
Client engagement & stakeholder management
- Serve as the primary SOC point of contact for client stakeholders — leading governance calls and QBRs
- Prepare and present monthly and quarterly SOC reports for both technical and executive audiences
- Translate complex security findings into clear, risk-contextualised language for C-suite communication
- Manage client expectations proactively — flagging risks and posture changes before they escalate
Team leadership & cross-functional collaboration
- Lead and mentor a team of SOC analysts (L1/L2/L3) — performance expectations, appraisals, skills development
- Act as primary escalation point for the team on complex incidents and ambiguous threat scenarios
- Collaborate with infrastructure, IAM, network, and compliance teams for integrated security coverage
- Drive a continuous improvement culture — blameless retrospectives, lessons learned, good practice recognition
- Coordinate with ITSM and change management to ensure security events are correctly tracked and closed
Skills & Experience
- 7+ years in security operations in a managed services or multi-client SOC environment
- Hands-on Palo Alto XSIAM — rule writing, playbook development, data source integration, threat hunting
- Strong Trellix knowledge — policy management, EDR configuration, SIEM integration
- Microsoft Defender for Endpoint (MDE) — onboarding, custom KQL detections, incident response
- Qualys expertise — scan configuration, asset management, vulnerability reporting, remediation governance
- Threat intelligence capability — IOC analysis, MITRE ATT&CK mapping, threat hunting methodology
- Strong ITIL process knowledge applied in live operations — incident, problem, change, and service reporting
- Proven ability to lead client-facing governance sessions and communicate to senior stakeholders
- Track record of building or improving SOC processes and runbooks
Desirable
- Certifications: CISSP, CISM, CEH, SC-200, Palo Alto XSIAM specialist
- SOAR scripting — Python or PowerShell for playbook development
- Cloud security operations — Azure Sentinel, AWS Security Hub
- Regulatory framework familiarity — PCI-DSS, SOC 2, ISO 27001
Behavioural Competencies
- Accountability — owns outcomes, not just activities
- Client orientation — treats operational excellence and client confidence as inseparable
- Composure under pressure — leads calmly during P1s regardless of client or internal pressure
- Communication clarity — adjusts depth and tone for engineers, managers, and executives
- Continuous improvement mindset — treats every incident and process gap as a learning opportunity
- Collaborative leadership — builds trust across functions through expertise and follow-through
Skills
AWS Security HubAzure SentinelCEHCISSPCISMDockerITILISO 27001MITRE ATT&CKMicrosoft Defender for EndpointPalo Alto XSIAMPCI-DSSPowerShellPythonQualysSC-200SOC 2Trellix
Don't send a generic resume
Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.
Get started free