CyberSecurity/SOC Engineer - REMOTE (DC Area Preferred)

CyberSecurity/SOC Engineer - REMOTE (DC Area Preferred)

Posted 1 day ago by 1761295993

Negotiable
Outside
Remote
USA

Summary: The SOC Engineer role focuses on engineering SOC data feed solutions and implementing SOAR capabilities while ensuring feed health through collaboration. The candidate will have strong cybersecurity expertise and serve as the backup SOC Lead, managing operations and escalations during critical incidents. This position requires a proactive approach to threat detection and incident response, along with a commitment to continuous improvement of SOC capabilities.

Key Responsibilities:

  • Maintain and optimize a Microsoft Sentinel SIEM/SOAR solution in alignment with client requirements and compliance mandates.
  • Configure and manage log/data feeds from diverse sources.
  • Develop and refine log parsing rules to ensure accurate data in Sentinel.
  • Engineer automation and orchestration solutions to improve SOC efficiency.
  • Build, tune, and optimize analytic rules and dashboards for detection and response.
  • Partner with cross-functional teams to integrate new data sources.
  • Develop and maintain documentation of SOC architecture and processes.
  • Conduct gap analyses and recommend improvements for SOC capabilities.
  • Provide Tier 3 support and assist with complex investigations.

Key Skills:

  • Bachelor's degree in Computer Science, Information Security, or related field.
  • 5+ years of progressive cybersecurity/SOC experience.
  • 2-5 years of experience in network defense or SOC engineering.
  • Hands-on experience with Microsoft Sentinel.
  • Proficiency with log parsing and normalization.
  • Strong scripting skills in PowerShell and/or Python.
  • Experience configuring and maintaining data feeds for SOC visibility.
  • Familiarity with incident response concepts and SOAR workflows.
  • Excellent written and verbal communication skills.

Salary (Rate): undetermined

City: undetermined

Country: USA

Working Arrangements: remote

IR35 Status: outside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

SOC Engineer REMOTE (DC Area Preferred) (Must be willing to come in once a quarter for a team meeting) Public Trust

This role focuses on engineering SOC data feed solutions, implementing SOAR capabilities, and ensuring feed health through cross-team collaboration. The ideal candidate will have strong cybersecurity expertise, including network security, SIEM, incident response, and threat detection.

They will also serve as the backup SOC Lead, overseeing operations, managing escalations, and providing updates to senior leadership during critical incidents when the primary lead is unavailable.

Key Responsibilities

- Microsoft Sentinel Engineering: Maintain and optimize a Microsoft Sentinel SIEM/SOAR solution in alignment with client requirements, industry best practices, and federal compliance mandates.

- Data Integration: Configure and manage log/data feeds from diverse sources (e.g., Fluent Bit, Windows Events, M365, cloud services, endpoint/security platforms).

- Parsing & Normalization: Develop and refine log parsing rules using Regex, DCRs, and custom transformations to ensure accurate and usable data in Sentinel.

- SOAR Development: Engineer automation and orchestration solutions using Microsoft Logic Apps, Azure Functions, and PowerShell/Python scripts to improve SOC efficiency and incident response.

- Threat Detection Engineering: Build, tune, and optimize analytic rules, UEBA, dashboards, and reports to improve detection and response coverage.

- Collaboration: Partner with cross-functional teams (network, endpoint, cloud, IT ops) to integrate new data sources and deliver actionable SOC capabilities.

- Documentation & Knowledge Transfer: Develop and maintain clear documentation of SOC architecture, log source onboarding, and automation playbooks; provide training for SOC analysts on new tools and processes.

- Advisory & Improvement: Conduct gap analyses of existing SOC capabilities, recommend improvements, and contribute to SOC process maturity.

- Incident Response Support: Provide Tier 3 support and assist with complex investigations when required.

Required Qualifications

Education & Experience

- Bachelor s degree in Computer Science, Information Security, or related field (or equivalent experience).

- 5+ years of progressive cybersecurity/SOC experience (engineering and operations).

- 2 5 years of experience in network defense, SOC engineering, or cybersecurity operations.

- Hands-on experience with Microsoft Sentinel, including log onboarding, rule development, and automation.

- Proficiency with log parsing and normalization (Regex, Fluent Bit, DCRs, KQL).

- Strong scripting skills in PowerShell and/or Python for automation and data handling.

- Experience configuring and maintaining data feeds for SOC visibility (cloud, endpoint, network, and on-prem).

- Familiarity with incident response concepts, threat detection engineering, and SOAR workflows.

- Excellent written and verbal communication skills with ability to work across technical and non-technical teams.

Preferred Qualifications

- Knowledge of federal cybersecurity mandates (M-21-31, NIST Cybersecurity Framework, CISA Incident/Vulnerability Playbooks, BOD 22-01).

- Experience with Microsoft Logic Apps, Azure Functions, or other SOAR development platforms.

- Experience with UEBA configuration to enhance anomaly detection.

- Background in AI/ML frameworks for cyber analytics.

- Experience building SOC metrics, dashboards, and reporting for operational visibility.

- Familiarity with M365, Azure security tools, ServiceNow workflows, and CISA CDM tools.

- Relevant certifications such as CISSP, CISM, Microsoft Security Operations Analyst (SC-200), or Azure Security Engineer (AZ-500).