Sr. SOC Analyst (Lake Forest)
Refactor Talent
Job Description
We are seeking an experienced Senior Security Analyst to join a tier-less security operations environment. In this role, you will proactively identify and mitigate threats through advanced threat hunting, detection, and incident response across a multi-site network environment. This position is ideal for a highly motivated cybersecurity professional who thrives in a hands-on environment, takes ownership of complex investigations, and serves as a key escalation point for junior analysts. You will perform deep forensic analysis, enhance detection capabilities, and continuously refine security playbooks to strengthen the organization’s security posture. Key Responsibilities Provide shift leadership and operational support Act as an escalation point for complex security incidents Mentor and guide junior analysts; oversee intrusion investigations Monitor and analyze security events across SIEMs and other channels (email, phone, chat) Investigate threat activity and escalate incidents as needed Review incident reports for accuracy, completeness, and quality Ensure adherence to procedures, standards, and playbooks Conduct ticket reviews and maintain quality control standards Develop, refine, and maintain incident response processes Identify emerging attack vectors and recommend detection strategies Analyze network security requirements and support system design/implementation Configure and maintain security tools (IDS, EDR, web security, vulnerability management) Perform internal audits to support compliance initiatives What You’ll Be Doing Day-to-Day Leading shift operations and coordinating incident response efforts Conducting deep forensic investigations on endpoints and network activity Monitoring and analyzing security data across multiple platforms Mentoring junior analysts and ensuring high-quality investigations and reporting Continuously improving incident response playbooks and processes Demonstrating ownership, accountability, and a strong on-site collaborative work ethic Required Qualifications 6+ years of experience in cybersecurity operations or related field Strong hands-on experience with SIEM monitoring and threat analysis Deep understanding of TCP/IP, networking, and common protocols (HTTP, HTTPS, SSH, FTP, DNS, NTP) Experience with IDS/IPS, EDR, and other security tools Proven expertise in incident response and forensic investigations Knowledge of Linux, Windows, and macOS environments Strong understanding of security architecture and investigative methodologies Excellent communication and technical writing skills Preferred Qualifications Bachelor’s degree in a related field (preferred) 8–10 years of relevant experience Industry certifications such as: ITIL, CISSP, GIAC, GCIH, GNFA, GDAT Compensation This position offers a pay range of $55–$60 per hour , depending on experience, skills, and qualifications. Equal Opportunity Employer We are an equal opportunity employer and comply with all applicable federal, state, and local employment laws. Pay Transparency Notice Compensation information is provided in accordance with applicable state and local laws. AI & Technology Use We may use technology tools to assist with candidate sourcing and communication. These tools do not make hiring decisions.
All employment decisions are made by our recruiting team.