Logo for VerTALENTS

Security Operations Analyst

Roles & Responsibilities

  • Hands-on experience with at least one major SIEM platform (e.g., Splunk, Microsoft Sentinel, Elastic, or QRadar)
  • Experience with EDR/XDR platforms (e.g., CrowdStrike, SentinelOne, Defender, etc.)
  • Detection rule creation or tuning experience, including writing or modifying YARA rules
  • Scripting capability (Python, PowerShell, or similar) and understanding of Windows, Linux, and cloud telemetry

Requirements:

  • Lead structured investigations across SIEM, EDR, email security, and cloud telemetry; determine root cause and blast radius; correlate telemetry with threat intelligence to assess impact; deliver executive-ready findings; support containment, eradication, and recovery efforts
  • Develop and tune SIEM detection rules across multiple environments; create and refine YARA rules for malware detection; engineer new detection use cases aligned to emerging threats; conduct hypothesis-driven threat hunts; reduce false positives through precision tuning; map detections to MITRE ATT&CK where appropriate
  • Leverage AI tooling to accelerate log analysis and enrichment; validate AI outputs and refine workflows; identify repetitive investigative tasks suitable for automation; collaborate on operationalizing AI-assisted playbooks; increase efficiency without sacrificing analytical rigor
  • Conduct post-incident detection gap reviews; translate lessons learned into measurable detection improvements; contribute to knowledge base and investigation standards; track and improve operational performance metrics

Job description

VerTALENTS is a subsidiary of VerSprite Cybersecurity. Specializing in technology staffing and utilizing a network of technical clients, VerTALENTS connects top level technical talent with industry clients through various methods and expands not only clients talent network, but candidates job search as well. At the bottom line, VerTALENTS adds value to both clients and candidates alike.

We work with clients to fill both full-time and contracting opportunities, so If the following job interests you, please apply to learn more!

Security Operations Analyst

enterprise mssp | ai-augmented soc | detection engineering focus

Location: Remote Costa Rica or Argentina (u.s. time zone alignment required)

Who we are:

We operate a next-generation, ai-augmented security operations center supporting enterprise clients across multiple industries. This is not a traditional alert-triage soc role.

Our analysts investigate sophisticated threats, engineer high-fidelity detections, leverage ai to accelerate analysis, and continuously improve how security operations are executed across multiple client environments.

If you are looking to simply manage a queue, this is not the role.

if you want ownership over investigation quality, detection precision, and automation impact…keep reading.

What you will own

enterprise-grade investigations

  • lead structured investigations across siem, edr, email security, and cloud telemetry
  • determine root cause and blast radius — not just close alerts
  • correlate telemetry with threat intelligence to assess impact
  • deliver clear, executive-ready findings tailored to enterprise stakeholders
  • support containment, eradication, and recovery efforts

detection engineering & threat hunting

  • develop and tune siem detection rules across multiple environments
  • create and refine yara rules for malware detection
  • engineer new detection use cases aligned to emerging threats
  • conduct hypothesis-driven threat hunts
  • reduce false positives through precision tuning
  • map detections to mitre attack where appropriate

you will influence detection quality directly, not just consume alerts.

ai-augmented analysis & automation

  • leverage ai tooling to accelerate log analysis and enrichment
  • validate ai outputs and refine workflows
  • identify repetitive investigative tasks suitable for automation
  • collaborate on operationalizing ai-assisted playbooks
  • increase efficiency without sacrificing analytical rigor

ai is an accelerator, not a substitute for judgement.

continuous improvement

  • conduct post-incident detection gap reviews
  • translate lessons learned into measurable detection improvements
  • contribute to knowledge base and investigation standards
  • track and improve operational performance metrics

Required Technical Experience

  • hands-on experience with at least one major siem platform (splunk, sentinel, elastic, google secops, qradar, etc.)
  • experience with edr/xdr platforms (crowdstrike, sentinelone, defender, etc.)
  • detection rule creation or tuning experience
  • experience writing or modifying yara rules
  • understanding of windows, linux, and cloud telemetry
  • threat intelligence and ioc handling experience
  • incident response lifecycle familiarity
  • scripting capability (python, powershell, or similar)
  • strong written english for client-facing reporting

It would be great if you have

  • mssp or multi-tenant enterprise experience
  • soar exposure
  • mitre att&ck mapping experience
  • cloud security investigation (aws/azure/gcp)
  • experience reducing false positives at scale
  • experience using ai tools in investigation workflows
  • malware analysis fundamentals

we value

  • ownership over outcomes
  • analytical discipline
  • technical curiosity
  • clear business communication
  • calm under pressure
  • comfort operating across multiple enterprise environments

If you want to grow beyond traditional soc boundaries and help shape modern security operations , we want to meet you.

Security Operations Center (SOC) Analyst Related jobs

Other jobs at VerTALENTS

We help you get seen. Not ignored.

We help you get seen faster — by the right people.

🚀

Auto-Apply

We apply for you — automatically and instantly.

Save time, skip forms, and stay on top of every opportunity. Because you can't get seen if you're not in the race.

✨

AI Match Feedback

Know your real match before you apply.

Get a detailed AI assessment of your profile against each job posting. Because getting seen starts with passing the filters.

Upgrade to Premium. Apply smarter and get noticed.

Upgrade to Premium

Join thousands of professionals who got noticed and hired faster.