BETSOL Logo

BETSOL

SOC Level 3 Analyst & Incident Response Lead

Posted 6 Days Ago
In-Office or Remote
Hiring Remotely in Denver, CO
Senior level
In-Office or Remote
Hiring Remotely in Denver, CO
Senior level
Manage critical security events, conduct forensic investigations, enhance the incident response program, and mentor junior SOC analysts.
The summary above was generated by AI
Company Description

BETSOL is a cloud-first digital transformation and data management company offering products and IT services to enterprises in over 40 countries. BETSOL team holds several engineering patents, is recognized with industry awards, and BETSOL maintains a net promoter score that is 2x the industry average.

BETSOL’s open source backup and recovery product line, Zmanda (Zmanda.com), delivers up to 50% savings in total cost of ownership (TCO) and best-in-class performance.

BETSOL Global IT Services (BETSOL.com) builds and supports end-to-end enterprise solutions, reducing time-to-market for its customers.

BETSOL offices are set against the vibrant backdrops of Broomfield, Colorado and Bangalore, India.

We take pride in being an employee-centric organization, offering comprehensive health insurance, competitive salaries, 401K, volunteer programs, and scholarship opportunities. Office amenities include a fitness center, cafe, and recreational facilities.

Job Description

We are seeking a highly skilled and experienced Tier 3 SOC Analyst who will also function as the Incident Response Lead. This is a hybrid technical-leadership position focused on managing critical security events, conducting forensic investigations, and continuously enhancing the incident response program. As a senior member of the SOC, you will be the escalation point for complex and high-impact security incidents, support forensic analysis, lead root cause investigations, and contribute to detection engineering efforts. 

Qualifications

Key Responsibilities

Tier 3 SOC Analyst Duties

  • Act as the final escalation point for complex security alerts and incidents identified through Azure Sentinel and other security monitoring tools.
  • Conduct in-depth digital forensic investigations across endpoints, networks, and cloud infrastructure (Azure, M365, Microsoft Dynamics, etc.).
  • Perform malware analysis, reverse engineering, and memory/disk analysis to support incident triage and response.
  • Provide expert-level guidance to Tier 1 and Tier 2 SOC analysts; coach and mentor to raise team capabilities.
  • Correlate threat intelligence with incident data to understand adversary behavior and campaign objectives.
  • Collaborate with SIEM engineers to tune, develop, and optimize detection use cases, particularly for emerging threats.
  • Maintain documentation of playbooks, threat scenarios, and incident patterns.

Incident Response Lead Duties

  • Lead and coordinate the end-to-end incident response lifecycle, from detection through containment, eradication, and recovery.
  • Own and maintain IR documentation including incident tracking, timelines, RCA, and after-action reports.
  • Liaise with the CSIRT team and relevant business stakeholders during critical incidents.
  • Lead post-incident reviews and facilitate lessons learned workshops, contributing to policy, procedure, and control improvements.
  • Drive continuous process improvement across SOC and IR operations, ensuring integration with change and problem management.
  • Ensure executive-level incident reporting and briefings are prepared and delivered as needed.

Qualifications

Required

  • 5+ years of experience in a Security Operations Center or Incident Response role.
  • Proven experience leading major incident response efforts (e.g., ransomware, APT, data breaches).
  • Strong forensic analysis skills (disk, memory, log, and network forensics).
  • Advanced proficiency in SIEM platforms (preferably Microsoft Sentinel), EDR tools (Defender for Endpoint), and forensic toolsets.
  • Hands-on experience with vulnerability management and cloud security tools such as Wiz, Tenable, or Qualys.
  • Understanding of attacker TTPs mapped to MITRE ATT&CK and threat hunting methodologies.
  • Hands-on experience with scripting and automation (e.g., PowerShell, Python) to streamline investigations and response.
  • Knowledge of security controls, network protocols, operating systems, and cloud environments (Azure).
  • Strong communication skills and ability to present technical findings to non-technical stakeholders.

Additional Information

Desirable Certifications

  • GIAC Certified Forensic Analyst (GCFA) or GIAC Certified Incident Handler (GCIH)
  • CISSP, oscp, GCIA, or equivalent
  • Microsoft certifications: SC-200, SC-300, AZ-500

Key Competencies

  • Calm and decisive under pressure
  • Analytical and detail-oriented
  • Strong leadership and collaboration skills
  • Proactive approach to process optimization and threat mitigation
  • Passion for continuous learning and capability development

    Top Skills

    Azure Sentinel
    Defender For Endpoint
    Microsoft 365
    Microsoft Dynamics
    Powershell
    Python
    Qualys
    Tenable
    Wiz
    HQ

    BETSOL Broomfield, Colorado, USA Office

    10901 W 120th Suite 235, Broomfield, CO, United States, 80021

    Similar Jobs

    2 Hours Ago
    Remote
    United States
    96K-171K Annually
    Mid level
    96K-171K Annually
    Mid level
    Big Data • Transportation • Analytics • Big Data Analytics
    The Product Manager will oversee mobile technology development, gather product requirements, and align them with customer needs and business goals.
    Top Skills: Scrum
    2 Hours Ago
    Remote or Hybrid
    United States
    Senior level
    Senior level
    Artificial Intelligence • Big Data • Cloud • Information Technology • Software • Big Data Analytics • Automation
    Lead technical initiatives in Dynatrace, focusing on enhancing customer success through best practices, knowledge sharing, and technical leadership. Engage with stakeholders, and manage specialized topics.
    Top Skills: Cloud-Native ApplicationsDatadogDynatraceIaasPaasSplunk
    3 Hours Ago
    Remote or Hybrid
    United States
    180K-215K Annually
    Expert/Leader
    180K-215K Annually
    Expert/Leader
    HR Tech • Information Technology • News + Entertainment • Professional Services • Sales • Software
    Lead and manage HiBob's global technology partnerships by defining strategies, driving revenue-generating initiatives, and collaborating with internal and external teams.
    Top Skills: APIsAWSAzureB2B SoftwareCloudGCPSaaS

    What you need to know about the Colorado Tech Scene

    With a business-friendly climate and research universities like CU Boulder and Colorado State, Colorado has made a name for itself as a startup ecosystem. The state boasts a skilled workforce and high quality of life thanks to its affordable housing, vibrant cultural scene and unparalleled opportunities for outdoor recreation. Colorado is also home to the National Renewable Energy Laboratory, helping cement its status as a hub for renewable energy innovation.

    Key Facts About Colorado Tech

    • Number of Tech Workers: 260,000; 8.5% of overall workforce (2024 CompTIA survey)
    • Major Tech Employers: Lockheed Martin, Century Link, Comcast, BAE Systems, Level 3
    • Key Industries: Software, artificial intelligence, aerospace, e-commerce, fintech, healthtech
    • Funding Landscape: $4.9 billion in VC funding in 2024 (Pitchbook)
    • Notable Investors: Access Venture Partners, Ridgeline Ventures, Techstars, Blackhorn Ventures
    • Research Centers and Universities: Colorado School of Mines, University of Colorado Boulder, University of Denver, Colorado State University, Mesa Laboratory, Space Science Institute, National Center for Atmospheric Research, National Renewable Energy Laboratory, Gottlieb Institute

    Sign up now Access later

    Create Free Account

    Please log in or sign up to report this job.

    Create Free Account