Senior Cyber Analyst (R3665)
San Diego Metro Area
⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️
Shield AI
AI pilots will revolutionize battlefields and commercial aviation at a scale greater than the self-driving movement reshaping our highways.
Founded in 2015, Shield AI is a venture-backed defense technology company with the mission of protecting service members and civilians with intelligent systems. Its products include the V-BAT aircraft, Hivemind Enterprise, and the Hivemind Vision product lines. With offices in San Diego, Dallas, Washington, D.C., Abu Dhabi (UAE), Kyiv (Ukraine), and Melbourne (Australia), Shield AI’s technology actively supports U.S. and allied operations worldwide. For more information, visit www.shield.ai. Follow Shield AI on LinkedIn,X, YouTubeand Instagram.
Job Description:We are seeking a skilled SOC Analyst to support and enhance our 24x7 security operations. This role will focus on monitoring alerts, triaging incidents, and escalating threats as needed to ensure timely response. The analyst will work closely with engineers and incident responders to improve detection quality and response workflows. They will also contribute to threat hunting, playbook development, and analysis of security telemetry. Ideal candidates have a strong technical background in cybersecurity and experience working in operational SOC environments.
Full-time regular employee offer package: Pay within range listed + Bonus + Benefits + Equity
Temporary employee offer package: Pay within range listed above + temporary benefits package (applicable after 60 days of employment)
Salary compensation is influenced by a wide array of factors including but not limited to skill set, level of experience, licenses and certifications, and specific work location. All offers are contingent on a cleared background and possible reference check. Military fellows and part-time employees are not eligible for benefits. Please speak to your talent acquisition representative for more information.
###
Shield AI is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, marital status, disability, gender identity or Veteran status. If you have a disability or special need that requires accommodation, please let us know.
Job Description:We are seeking a skilled SOC Analyst to support and enhance our 24x7 security operations. This role will focus on monitoring alerts, triaging incidents, and escalating threats as needed to ensure timely response. The analyst will work closely with engineers and incident responders to improve detection quality and response workflows. They will also contribute to threat hunting, playbook development, and analysis of security telemetry. Ideal candidates have a strong technical background in cybersecurity and experience working in operational SOC environments.
What you'll do:
- Monitor and triage security alerts from SIEM, EDR, and SOAR platforms to identify potential threats.
- Investigate suspicious activity, escalate incidents based on severity, and support incident response efforts.
- Collaborate with engineers to refine detection logic and reduce false positives.
- Participate in threat hunting activities to proactively identify indicators of compromise.
- Maintain accurate documentation of incidents, response actions, and lessons learned.
Required qualifications:
- 3+ years of experience in a Security Operations Center (SOC) or similar cybersecurity role.
- Familiarity with SIEM, EDR, and SOAR tools, and the ability to interpret logs, alerts, and telemetry data.
- Understanding of common attack vectors, threat actors, and incident response workflows.
- Strong analytical and problem-solving skills with the ability to work independently under pressure.
- Excellent written and verbal communication skills for documenting and escalating incidents clearly.
Preferred qualifications:
- Experience with threat hunting techniques and applying threat intelligence to investigations.
- Hands-on knowledge of endpoint detection and response (EDR), security information and event management (SIEM), or security orchestration, automation, and response (SOAR) tools.
- Familiarity with the MITRE ATT&CK framework and its use in detection and analysis.
- Background in scripting or automation (e.g., Python, PowerShell) to streamline SOC operations.
- Relevant certification, education, or military experience in cybersecurity operations or analysis.
Full-time regular employee offer package: Pay within range listed + Bonus + Benefits + Equity
Temporary employee offer package: Pay within range listed above + temporary benefits package (applicable after 60 days of employment)
Salary compensation is influenced by a wide array of factors including but not limited to skill set, level of experience, licenses and certifications, and specific work location. All offers are contingent on a cleared background and possible reference check. Military fellows and part-time employees are not eligible for benefits. Please speak to your talent acquisition representative for more information.
###
Shield AI is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, marital status, disability, gender identity or Veteran status. If you have a disability or special need that requires accommodation, please let us know.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
1
0
0
Category:
Analyst Jobs
Tags: Automation C EDR Incident response MITRE ATT&CK Monitoring PowerShell Python Scripting SIEM SOAR SOC Threat intelligence
Perks/benefits: Equity / stock options Salary bonus
Region:
North America
Country:
United States
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Systems Administrator jobsSenior Security Analyst jobsIT Security Analyst jobsSenior Information Security Analyst jobsInformation System Security Officer jobsSenior Cloud Security Engineer jobsCyber Security Specialist jobsSecurity Operations Engineer jobsSenior Product Security Engineer jobsInformation Security Manager jobsInformation System Security Officer (ISSO) jobsSenior Information Security Engineer jobsSenior Network Security Engineer jobsSenior Cyber Security Engineer jobsSecurity Specialist jobsChief Information Security Officer jobsSecurity Consultant jobsInformation Systems Security Engineer jobsSenior Software Engineer jobsNetwork Engineer jobsIT Security Engineer jobsCyber Threat Intelligence Analyst jobsSecurity Operations Analyst jobsCybersecurity Specialist jobsSoftware Engineer jobs
Security assessment jobsEDR jobsBash jobsTS/SCI jobsEncryption jobsRMF jobsSDLC jobsIDS jobsSQL jobsThreat detection jobsSplunk jobsITIL jobsMalware jobsTerraform jobsCompTIA jobsIPS jobsFinance jobsTop Secret jobsOWASP jobsForensics jobsSOC 2 jobsDocker jobsActive Directory jobsGIAC jobsClearance Required jobs
CRISC jobsDoDD 8570 jobsOSCP jobsTCP/IP jobsMITRE ATT&CK jobsIntrusion detection jobsHIPAA jobsVPN jobsCCSP jobsZero Trust jobsDNS jobsSOAR jobsUNIX jobsJavaScript jobsAnsible jobsIT infrastructure jobsIndustrial jobsNIST 800-53 jobsData Analytics jobsJira jobsKPIs jobsSANS jobsBanking jobsSOX jobsGCIH jobs