Sr. SOC Analyst – Cyber Threat Intelligence

Casa Grande, AZ

⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️

Lucid Motors

Lucid is the future of sustainable mobility, designing electric cars that further reimagines the driving experience.

View all jobs at Lucid Motors

Apply now Apply later

Leading the future in luxury electric and mobility At Lucid, we set out to introduce the most captivating, luxury electric vehicles that elevate the human experience and transcend the perceived limitations of space, performance, and intelligence. Vehicles that are intuitive, liberating, and designed for the future of mobility.   We plan to lead in this new era of luxury electric by returning to the fundamentals of great design – where every decision we make is in service of the individual and environment. Because when you are no longer bound by convention, you are free to define your own experience.   Come work alongside some of the most accomplished minds in the industry. Beyond providing competitive salaries, we’re providing a community for innovators who want to make an immediate and significant impact. If you are driven to create a better, more sustainable future, then this is the right place for you.

At Lucid Motors, the Senior SOC Analyst, Cyber Threat Intelligence DFIR is responsible for the Security operations, Incident response, Threat Hunting and Cyber Threat Intelligence. This role is essential to strengthening our threat-informed defense posture and providing strategic and tactical intelligence to Security Operations, Incident Response, and Risk teams. The ideal candidate will bring deep experience in threat intelligence lifecycle management, dark web monitoring, identity intelligence, and exposure of enterprise assets across surface, deep, and dark web environments. 
 
You Will:

  • Collect, analyze, and operationalize threat intelligence across surface, deep, and dark web sources. 
  • Use tools such as Recorded Future, CrowdStrike Counter Adversary Module, OSINT, and dark web monitoring platforms to identify emerging threats, campaigns, and threat actor behaviors. 
  • Perform identity intelligence and account exposure investigations across criminal forums, paste sites, and marketplaces. 
  • Monitor and assess threats from social media, hacktivist groups, and geopolitical activity. 
  • Enrich SOC and IR investigations with contextual threat intelligence (IOCs, TTPs, attribution). 
  • Track and report on threat actors, malware families, exploit trends, and sector-specific targeting. 
  • Produce periodic threat assessments, intelligence briefings, and alerts for internal stakeholders. 
  • Collaborate with Detection Engineering to convert intelligence into detections and hunt hypotheses. 
  • Support intelligence requirements for Security Operations, Incident Response, Risk, and Legal teams. 
  • Proficient with forensic tools such as EnCase, FTK, Velociraptor, Volatility, etc. 
  • Experience with SIEM, EDR, and SOAR platforms (e.g., Splunk, CrowdStrike, SentinelOne). 
  • Strong knowledge of network protocols, system internals (Windows/Linux), and common attack techniques. 

You Bring:

  • 3–6 years of experience in Cyber Threat Intelligence, Security Operations, or Threat Hunting. 
  • Proficiency with Recorded Future, CrowdStrike (especially Counter Adversary Module), and dark web intelligence platforms. 
  • Deep understanding of threat actor TTPs, MITRE ATT&CK framework, and intelligence lifecycle. 
  • Experience in multiple intelligence disciplines including: 
  • Threat Intelligence (TI) 
  • SecOps Intelligence 
  • Identity Intelligence 
  • Dark Web Intelligence 
  • Surface Web Intelligence 
  • Social Media Monitoring 
  • Third Party Intelligence  
  • Strong writing skills for producing intelligence reports, threat profiles, and executive summaries. 

Preferred: 

  • Familiarity with TIP platforms, STIX/TAXII feeds, and intel ingestion into SIEM/SOAR tools. 
  • Certifications such as GCTI, GREM, CTIA, or GCIA
  • Understanding of geopolitical and nation-state threat landscapes. 
  • Experience contributing to threat hunting and red team exercises. 

 

By Submitting your application, you understand and agree that your personal data will be processed in accordance with our Candidate Privacy Notice. If you are a California resident, please refer to our California Candidate Privacy Notice.

To all recruitment agencies: Lucid Motors does not accept agency resumes. Please do not forward resumes to our careers alias or other Lucid Motors employees. Lucid Motors is not responsible for any fees related to unsolicited resumes. 
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  20  1  0

Tags: CrowdStrike DFIR EDR EnCase Exploit Forensics GCIA GCTI GREM Incident response Linux Malware MITRE ATT&CK Monitoring OSINT Privacy Red team SecOps SIEM SOAR SOC Splunk Threat intelligence TTPs Windows

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.