Cyber Advisors (CA) is a rapidly growing Cybersecurity Consulting firm and MSP. We are seeking a Senior SOC Analyst for our Defensive Security team, to support our accelerating company growth and the equally important growth of one’s own career. CA believes in inclusion and is dedicated to continued employee development. We offer a competitive salary and benefits and want candidates who focus on innovation and results. Successful CA employees are detail oriented and have excellent communication skills. The successful candidate will be a creative problem-solver with the ability to structure and order assignments efficiently. Candidates should apply to become part of a forward-thinking team that values your contributions and well-being
SUMMARY
The Senior SOC Analyst is a technical lead responsible for advanced investigations, incident coordination, and continuous improvement of documentation and detection and response capabilities. This role leads escalations, complex cases end-to-end, mentors junior analysts, and partners with engineering and stakeholders to reduce risk across endpoint, network, identity, and cloud environments.
KEY RESPONSIBILITIES
- Lead deep-dive investigations across SIEM/EDR, cloud, and network telemetry; build timelines and determine scope and impact.
- Perform advanced analysis of endpoint activity, authentication/identity events, email telemetry, and network artifacts to identify attacker TTPs.
- Drive case direction by forming and testing hypotheses; identify containment and remediation actions with clear rationale.
- Provide clear, actionable technical updates and risk-based recommendations to technical and nontechnical audiences.
- Conduct root cause analysis and contribute to post-incident reviews; ensure corrective actions and detection improvements are tracked to completion.
- Develop and maintain detection content (KQL/SPL/Sigma) and associated response playbooks; validate efficacy through testing and tuning.
- Perform proactive threat hunting using known IOCs, behavioral analytics, and threat intelligence; document hunt hypotheses and outcomes.
- Design or request SOAR/automation improvements to reduce time-to-triage and improve consistency (enrichment, containment workflows, reporting).
- Mentor and coach SOC Analysts; provide structured feedback on investigations, ticket quality, and incident handling.
- Establish and reinforce documentation standards, severity classification consistency, and investigation methodologies.
- Deliver high-quality incident reports including executive summaries, technical details, and prioritized remediation recommendations (as assigned).
WORK SCHEDULE AND ENVIROMENT
- SOC operations may include evenings, nights, weekends, and holidays depending on coverage needs.
- Participation in an on-call rotation may be required, including serving as an escalation point for major incidents.
- This role requires calm leadership during high-stress events and the ability to manage multiple parallel investigations.
REQUIRED QUALIFICATION
- 3–6+ years of experience in security operations, incident response, threat detection, or threat analysis.
- Demonstrated experience leading complex investigations and coordinating incident response across technical teams.
- Strong proficiency with SIEM and EDR platforms; experience writing detection logic and running advanced queries (KQL/SPL/Sigma).
- Strong knowledge of adversary behaviors and frameworks (MITRE ATT&CK) and incident handling practices (NIST concepts).
- Experience with cloud and identity security telemetry (Microsoft 365, Azure/AWS, Entra ID/Azure AD) and modern endpoint telemetry.
- Excellent written and verbal communication skills; ability to brief technical and non-technical stakeholders.
- Relevant certifications (one or more): CySA+, GCIH, GCIA, ECIH (or equivalent). • Bachelor’s degree in a related field or equivalent practical experience.
PREFERRED QUALIFICATIONS
- Experience with SOAR platforms and building automation workflows.
- Experience with DFIR tooling and evidence handling for endpoint and cloud investigations.
- Advanced certifications (as applicable): GCED, CISSP, CTIA, or vendor-specific security operations certifications.
- Experience supporting regulated environments and communicating control impacts (HIPAA, PCI-DSS, CJIS, etc.).
- Experience partnering with detection engineering, purple team, or threat intel functions.
CORE COMPETENCIES
- Technical leadership and ownership mindset • Structured investigation methodology and strong attention to detail
- Operational excellence: prioritization, documentation standards, and follow-through
- Stakeholder communication and customer empathy
WHAT WE OFFER
- Competitive compensation and performance-based incentives.
- Vacation and PTO
- Employer-paid Health and Dental Insurance for CA employees.
- 401k with employer matching
- Opportunities for professional development, including certifications and ongoing training.
- Engaging, dynamic work on a wide range of client security challenges.
Top Skills
Similar Jobs
What you need to know about the Colorado Tech Scene
Key Facts About Colorado Tech
- Number of Tech Workers: 260,000; 8.5% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Lockheed Martin, Century Link, Comcast, BAE Systems, Level 3
- Key Industries: Software, artificial intelligence, aerospace, e-commerce, fintech, healthtech
- Funding Landscape: $4.9 billion in VC funding in 2024 (Pitchbook)
- Notable Investors: Access Venture Partners, Ridgeline Ventures, Techstars, Blackhorn Ventures
- Research Centers and Universities: Colorado School of Mines, University of Colorado Boulder, University of Denver, Colorado State University, Mesa Laboratory, Space Science Institute, National Center for Atmospheric Research, National Renewable Energy Laboratory, Gottlieb Institute



