L3 SOC Analyst – Cyber Threat Intelligence

Opens analogdevices.wd1.myworkdayjobs.com in a new tab

What You'll Do

  • Lead complex investigations into APTs, ransomware, insider threats, and other advanced adversarial activities affecting the organization.
  • Collect, analyze, and operationalize CTI from OSINT, commercial feeds, ISACs, and internal telemetry to enhance detection and response capabilities.
  • Create and present detailed intelligence assessments and executive briefings for both technical and non-technical audiences.
  • Track and profile threat actor TTPs using frameworks like MITRE ATT&CK to pre-empt emerging risks.
  • Develop and maintain advanced detection logic using SIEM, EDR, and cloud-native tools to ensure comprehensive coverage.
  • Conduct proactive threat hunting to identify and mitigate undetected or emerging threats.
  • Design and implement automated containment workflows, such as device isolation, email purging, and session revocation.
  • Maintain the incident response plan, ransomware decision framework, and other key operational templates.
  • Publish and help manage SOC KPIs/OKRs, such as MTTD/MTTR, false positive rates, and detection coverage metrics.
  • Oversee MSSP/vSOC partners, ensuring maximum value and alignment with detection and response strategies.
  • Required Qualifications Bachelor’s degree in computer science, Cybersecurity, or a related technical field or equivalent industry experience in a global enterprise.
  • Minimum 5+ years of experience in SOC operations, incident response (IR), cyber threat intelligence (CTI), or detection engineering roles.
  • Technical Expertise Advanced knowledge of SIEM (preferably Azure Sentinel), EDR/NDR, and cloud security platforms (e.g., Microsoft Defender suite, O365, Azure).
  • Expertise in CTI analysis, including threat actor profiling, malware analysis, and TTP tracking.
  • Proficiency in scripting and automation using Python, PowerShell, or Bash to streamline SOC workflows.
  • Hands-on experience with MITRE ATT&CK, SOAR, and forensic tools for incident response and threat detection.
  • Preferred Skills Professional certifications such as GCTI, GREM, GCIH, GCIA, CISSP, or CEH.
  • Cloud security certifications (e.g., Azure Security Engineer, AWS Security Specialist).
  • Knowledge of compliance frameworks like PCI-DSS, HIPAA, or GDPR.
  • Experience with vulnerability management platforms (e.g., Tenable, WIZ) and governance frameworks (e.g., SAML, OAuth, CSA).
  • Why Join Us? Cutting-Edge Technology: Work with state-of-the-art threat intelligence tools, cloud security platforms, and detection technologies.
  • Collaborative Culture: Be part of a forward-thinking SOC team that values collaboration, innovation, and continuous improvement.
  • Professional Growth: Access opportunities for advanced training, certifications, and career development.
  • Competitive Benefits: Enjoy a comprehensive compensation package, including healthcare, retirement plans, and flexible work arrangements.
  • Meaningful Impact: Play a vital role in protecting critical business operations and intellectual property from emerging global threats.
  • For positions requiring access to technical data, Analog Devices, Inc. may have to obtain export licensing approval from the U.S.
  • Department of Commerce - Bureau of Industry and Security and/or the U.S.
  • Department of State - Directorate of Defense Trade Controls.
  • As such, applicants for this position – except US Citizens, US Permanent Residents, and protected individuals as defined by 8 U.S.C. 1324b(a)(3) – may have to go through an export licensing review process.
  • We foster a culture where everyone has an opportunity to succeed regardless of their race, color, religion, age, ancestry, national origin, social or ethnic origin, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, parental status, disability, medical condition, genetic information, military or veteran status, union membership, and political affiliation, or any other legally protected group.
  • EEO is the Law: Notice of Applicant Rights Under the Law .
  • Job Req Type: Experienced Required Travel: Yes, 10% of the time Shift Type: 1st Shift/Days The expected wage range for a new hire into this position is $127,600 to $175,450.
  • Actual wage offered may vary depending on work location , experience, education, training, external market data, internal pay equity, or other bona fide factors.
  • This position qualifies for a discretionary performance-based bonus which is based on personal and company factors.
  • This position includes medical, vision and dental coverage, 401k, paid vacation, holidays, and sick time , and other benefits.

Sourced directly from Analog Devices’s career page

Your application goes straight to Analog Devices.

Analog Devices logo

Analog Devices

US, MA, Wilmington

Specialisation
Salary range
₹6-14 LPA to ₹45-80 LPA
Open roles at Analog Devices
938 positions
Job ID
/job/US-MA-Wilmington/Staff-Analyst--Information-Security_R261158-1

Get matched to roles like this

Upload your resume once. We’ll notify you when matching roles open up.

Join talent pool — free

Similar SoC roles