Skip to content
mimi

Senior Security Operations Center; SOC Analyst

Zelis

Jersey City · On-site Full-time Senior $60k – $80k/yr Today

About the role

Position

Senior Security Operations Center (SOC) Analyst

Company Tagline

At Zelis, we Get Stuff Done. So, let’s get to it!

A Little About Us

Zelis is modernizing the healthcare financial experience across payers, providers, and healthcare consumers. We serve more than 750 payers, including the top five national health plans, regional health plans, TPAs and millions of healthcare providers and consumers across our platform of solutions. Zelis sees across the system to identify, optimize, and solve problems holistically with technology built by healthcare experts – driving real, measurable results for clients.

A Little About You

You bring a unique blend of personality and professional expertise to your work, inspiring others with your passion and dedication. Your career is a testament to your diverse experiences, community involvement, and the valuable lessons you've learned along the way. You are more than just your resume; you are a reflection of your achievements, the knowledge you've gained, and the personal interests that shape who you are.

Position Overview

As a Senior Security Operations Center (SOC) Analyst, you’ll take the lead on investigating and mitigating security incidents across the organization. You’ll dig into digital evidence, guide teammates through complex problems, and help strengthen our overall detection and response capabilities. In this role, you’ll handle hands‑on technical work like forensics and incident analysis, while also supporting the team by sharing knowledge, improving processes, and helping shape how we respond to threats.

Your Team & Role

As a Senior Security Operations Center (SOC) Analyst, you’ll take the lead on investigating and mitigating security incidents across the organization. You’ll dig into digital evidence, guide teammates through complex problems, and help strengthen our overall detection and response capabilities. In this role, you’ll handle hands‑on technical work like forensics and incident analysis, while also supporting the team by sharing knowledge, improving processes, and helping shape how we respond to threats.

Additionally, 40% of this role will be focused around DLP and insider risk initiatives, which include incident analysis and process building in this space.

Key Responsibilities

  • Incident Analysis & Handling:
    Triage alerts, investigate suspicious activity, lead incident response steps, and coordinate containment and recovery efforts.
  • Data Collection & Normalization:
    Make sure logs and security data are gathered correctly, cleaned up, and organized so the team can analyze them effectively.
  • Digital Forensics:
    Examine systems, files, logs, and network data to understand what happened during security events.
  • Mentoring & Training:
    Help newer analysts grow by sharing your experience, offering guidance, and running training sessions when needed.
  • Technical / Process Guidance:
    Assist team members with technical questions, tool usage, investigation methods, and established response workflows.
  • Shift Leadership:
    Act as the point person during your shift: manage workload, oversee investigations, ensure smooth handoffs, and support teammates. Participate in a rotating on‑call schedule as required.
  • Innovation:
    Look for opportunities to improve processes, recommend new tools or automations, and help refine how the team operates.

What You Can Expect on a Typical Day

  • Reviewing alerts and logs to identify potential threats or unusual activity.
  • Leading or assisting with active investigations and driving them toward containment and resolution.
  • Running forensic analysis on hosts, cloud workloads, or network artifacts to uncover root causes and timelines.
  • Collaborating with IT, cloud, engineering, or other security teams to gather data or take action on investigations.
  • Sharing insights with teammates, helping them troubleshoot difficult cases, or walking them through an investigation technique.
  • Updating documentation, writing reports, or summarizing incident findings.
  • Teaching something new to the team—maybe a tool trick, a technique, or a better approach to analysis.
  • Handling shift responsibilities like queue management, monitoring ongoing investigations, and tracking priorities.
  • Identifying process gaps or tools that could be improved and…

Requirements

  • You bring a unique blend of personality and professional expertise to your work, inspiring others with your passion and dedication

Responsibilities

  • As a Senior Security Operations Center (SOC) Analyst, you’ll take the lead on investigating and mitigating security incidents across the organization
  • You’ll dig into digital evidence, guide teammates through complex problems, and help strengthen our overall detection and response capabilities
  • In this role, you’ll handle hands‑on technical work like forensics and incident analysis, while also supporting the team by sharing knowledge, improving processes, and helping shape how we respond to threats
  • As a Senior Security Operations Center (SOC) Analyst, you’ll take the lead on investigating and mitigating security incidents across the organization
  • You’ll dig into digital evidence, guide teammates through complex problems, and help strengthen our overall detection and response capabilities
  • In this role, you’ll handle hands‑on technical work like forensics and incident analysis, while also supporting the team by sharing knowledge, improving processes, and helping shape how we respond to threats
  • Additionally, 40% of this role will be focused around DLP and insider risk initiatives, which include incident analysis and process building in this space
  • Incident Analysis & Handling:
  • Triage alerts, investigate suspicious activity, lead incident response steps, and coordinate containment and recovery efforts
  • Data Collection & Normalization:
  • Make sure logs and security data are gathered correctly, cleaned up, and organized so the team can analyze them effectively
  • Digital Forensics:
  • Examine systems, files, logs, and network data to understand what happened during security events
  • Mentoring & Training:
  • Help newer analysts grow by sharing your experience, offering guidance, and running training sessions when needed
  • Assist team members with technical questions, tool usage, investigation methods, and established response workflows
  • Shift Leadership:
  • Act as the point person during your shift: manage workload, oversee investigations, ensure smooth handoffs, and support teammates
  • Participate in a rotating on-call schedule as required
  • Look for opportunities to improve processes, recommend new tools or automations, and help refine how the team operates
  • Reviewing alerts and logs to identify potential threats or unusual activity
  • Leading or assisting with active investigations and driving them toward containment and resolution
  • Running forensic analysis on hosts, cloud workloads, or network artifacts to uncover root causes and timelines
  • Collaborating with IT, cloud, engineering, or other security teams to gather data or take action on investigations
  • Sharing insights with teammates, helping them troubleshoot difficult cases, or walking them through an investigation technique
  • Updating documentation, writing reports, or summarizing incident findings
  • Teaching something new to the team—maybe a tool trick, a technique, or a better approach to analysis
  • Handling shift responsibilities like queue management, monitoring ongoing investigations, and tracking priorities
  • Identifying process gaps or tools that could be improved and…

Benefits

health_insurance

Skills

DLP

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free