Logo for KMC Solutions

XTN-2584703 | L3 SOC ANALYST

Key Facts

Remote From: 
Full time
Mid-level (2-5 years)
English

Other Skills

  • •
    Incident Reporting
  • •
    Collaboration
  • •
    Communication
  • •
    Analytical Skills
  • •
    Mentorship

Roles & Responsibilities

  • 3+ years of experience in SOC or incident response roles
  • Strong experience analyzing logs across endpoint, network, and cloud systems
  • Experience tuning or contributing to SIEM queries and detection logic
  • Familiarity with MITRE ATT&CK and adversary techniques

Requirements:

  • Lead investigations of high-severity alerts and suspected security incidents
  • Perform advanced analysis across endpoint, network, identity, and cloud telemetry
  • Conduct root cause analysis and produce detailed incident documentation
  • Mentor junior analysts and improve SOC investigation standards

Job description

About PsiQuantum

PsiQuantum is building the first useful quantum computers using silicon photonics and advanced semiconductor manufacturing. Protecting our research, infrastructure, and internal systems is critical to our mission.

Job Summary

PsiQuantum is seeking an L3 SOC Analyst to serve as a senior technical escalation point within Security Operations. This role focuses on complex investigations, alert analysis, and high-severity incident response. In addition to investigative responsibilities, this role collaborates with the Detection Lead to improve detection logic and contribute to custom rule development as well as strategic work to improve SOC tooling and processes. 

Comprehensive health benefits
Work flexibly from anywhere in over 20+ workspace locations
Access to KMC's exclusive pantry (MadMax Coffee, Fresh Fridge)
Diverse learning & growth opportunities
Accessible Cloud HR platform (Sprout)
Above standard leaves

Responsibilities

• Lead investigations of high-severity alerts and suspected security incidents.

• Perform advanced analysis across endpoint, network, identity, and cloud telemetry.

• Conduct root cause analysis and produce detailed incident documentation.

• Provide operational feedback to detection engineering on alert gaps and false positives.

• Assist with custom detection rule development and tuning during lower operational demand.

• Conduct proactive threat hunting activities.

• Support containment, eradication, and recovery efforts. 

• Mentor junior analysts and improve SOC investigation standards. 

Experience / Qualifications

• 3+ years of experience in SOC or incident response roles.

• Strong experience analyzing logs across endpoint, network, and cloud systems.

• Experience tuning or contributing to SIEM queries and detection logic.

• Familiarity with MITRE ATT&CK and adversary techniques.

• Strong knowledge of Windows, Linux, and identity-based attack patterns.

• Strong analytical, documentation, and communication skills. 

Additional relevant knowledge or experience related to the above requirements will be considered an advantage.

Related jobs

Other jobs at KMC Solutions

We help you get seen. Not ignored.

We help you get seen faster — by the right people.

🚀

Auto-Apply

We apply for you — automatically and instantly.

Save time, skip forms, and stay on top of every opportunity. Because you can't get seen if you're not in the race.

✨

AI Match Feedback

Know your real match before you apply.

Get a detailed AI assessment of your profile against each job posting. Because getting seen starts with passing the filters.

Upgrade to Premium. Apply smarter and get noticed.

Upgrade to Premium

Join thousands of professionals who got noticed and hired faster.