SOC Operations Specialist
About This Role
Who We Are! Back in 2019, spiderSilk was born with a bold idea: build regional, sovereign cybersecurity IP that could stand tall on the global stage.
Our mission? To shake up the way organizations protect their ever-changing digital worlds with continuous, intelligent, and autonomous security that doesn’t miss a beat.
We’re a global mix of curious minds, problem-solvers, and passionate builders, all united by one goal: making the internet a safer place for everyone. Around here, we thrive on vision, energy, and a strong sense of ownership.
If this feels like your kind of crew, you’ll probably fit right in.
About The Role We are looking for a highly experienced Senior Security Analyst to lead and manage our internal security operations. With a decade of proven expertise, the successful candidate will take ownership of day-to-day monitoring, detection, incident response, and security tool optimization to ensure the organization’s resilience against evolving cyber threats. This role requires a strong ability to design, implement, and continuously improve security operations processes.
Key Responsibilities
- Manage the organization’s internal security operations, ensuring continuous monitoring, detection, and response to threats.
- Lead the configuration, and optimization of CrowdStrike Falcon and Wazuh platforms.
- Oversee incident response activities, from triage through containment, eradication, and recovery.
- Perform in-depth analysis of security alerts, logs, and telemetry data to identify anomalies and potential intrusions.
- Develop and maintain playbooks, runbooks, and automation workflows to streamline SOC processes.
- Collaborate with IT, engineering, and business units to strengthen security controls across infrastructure, endpoints, and cloud services.
- Conduct threat hunting activities to proactively identify risks and vulnerabilities. Mentor junior analysts and foster a culture of continuous learning and knowledge sharing within the security team.
- Produce clear, actionable reports for technical and executive stakeholders on security posture, incidents, and improvements.
Qualifications
- 10+ years of experience in security operations, SOC, or a related cybersecurity function.
- Expertise in CrowdStrike Falcon and Wazuh, with hands-on deployment and operational experience.
- Strong background in incident response, threat hunting, and log analysis.
- Proficiency with SIEM, EDR, and other security monitoring technologies.
- Solid knowledge of network security, endpoint protection, and cloud environments (AWS, Azure, GCP preferred). Experience automating repetitive security workflows (Python, Bash, or similar scripting languages).
- Relevant certifications (e.g., OSCP, GCIA, GCIH, CISSP, or equivalent) are highly desirable.
- Strong analytical, communication, and leadership skills.
Stop applying blindly.
Start getting hired.
Base Career automates the hardest parts of job searching — apply smarter, not harder.
AI Resume in 60s
Your resume rewritten for this exact role using the job description as the brief.
ATS-Optimized
Get past automated screening filters with the right keywords matched to each job.
Application Tracker
Track every job, follow-up, and interview in one visual kanban board.
Free plan · No credit card required