About Analog Devices
Analog Devices, Inc. (NASDAQ: ) is a global semiconductor leader that bridges the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive advancements in digitized factories, mobility, and digital healthcare, combat climate change, and reliably connect humans and the world. With revenue of more than $9 billion in FY24 and approximately 24,000 people globally, ADI ensures today's innovators stay Ahead of What's Possible™. Learn more at and on and.
We are looking for a self -driven, and detail-oriented L3 SOC Analyst to join our ADI Cybersecurity team. In this role, you will investigate complex threats, hunt for anomalies, and play a critical part in protecting our digital ecosystem. If you are passionate about cybersecurity and you thrive in fast-paced environments this is your opportunity to make a real impact. We will support your development and growth in a Cyber Defense team that values innovation and collaboration.
Key Responsibilities
1. Be the primary escalation point for Level 1 and Level 2 SOC analysts, providing expertise in resolving complex incidents and advanced threat scenarios.
2. Perform advanced threat hunting and forensic analysis to identify malicious activity in the environment.
3. Contribute to incident response activities, including containment, eradication, and recovery, ensuring minimal impact to the business.
4. Analyze logs, network traffic, and endpoint data to detect sophisticated attacks and vulnerabilities.
5. Conduct proactive threat hunting in cloud environments (AWS, Azure, GCP) to identify and mitigate potential risks.
6. Assess and assist with securing cloud architectures, including IaaS, PaaS, and SaaS configurations.
7. Review and improve Identity and Access Management (IAM) policies, configurations, and security controls.
8. Perform forensic analysis on cloud platforms and virtualized environments.
9. Develop and maintain playbooks, detection rules, and incident response procedures to enhance SOC capabilities.
10. Enhance detection rules, correlation logic, and alerts in SIEM and other monitoring tools to improve accuracy and reduce false positives.
11. Collaborate with threat intelligence teams to correlate real-world threat intelligence with internal detections and alerts.
12. Conduct post-incident reviews, root cause analysis, and lessons-learned sessions to strengthen defenses.
13. Act as a technical mentor to less experienced team members, providing guidance, training, and feedback to enhance their skills.
14. Stay current on emerging threats, attack techniques, and security technologies to ensure the SOC remains proactive.
15. Ensure compliance with regulatory frameworks and best practices, such as NIST, MITRE ATT&CK, ISO 27001, and CIS.
Qualifications
Required Skills and Experience:
16. Bachelor’s degree in Cybersecurity, Computer Science, or a related field, OR equivalent experience.
17. 5+ years of experience in cybersecurity, with at least 3 years in a SOC or incident response role.
18. Demonstrable expertise in securing cloud platforms (AWS, Azure, GCP) and familiarity with their native security tools.
19. Practical experience with SIEM platforms for log analysis, rule creation, and tuning.
20. Proficiency in network security tools and techniques, such as IDS/IPS, packet capture analysis, and firewall configurations.
21. A comprehensive understanding of modern attack techniques, cloud vulnerabilities, and mitigation strategies.
22. Advanced understanding of endpoint detection and response (EDR) tools
23. In-depth knowledge of threat hunting, malware analysis, and forensics.
24. Familiarity with attack frameworks (e.g., MITRE ATT&CK) and applying them to SOC operations.
25. Experience responding to advanced threats, such as ransomware, APTs, and insider threats.
26. Strong scripting and automation skills (e.g., Python, PowerShell, or Bash) to streamline SOC operations.
Preferred Skills:
27. Certifications such as GCIH, GCIA, CEH, CISSP, or equivalent.
28. Cloud security certifications such as AWS Certified Security Specialist, Azure Security Engineer Associate, or Google Professional Cloud Security Engineer.
29. Experience with cloud security monitoring and incident response for AWS, Azure, or GCP.
30. Knowledge of threat intelligence platforms (TIPs) and integrating intelligence into SOC workflows.
31. Experience with SOAR (Security Orchestration, Automation, and Response) platforms to automate response processes.
32. Familiarity with compliance frameworks, such as PCI-DSS, HIPAA, or GDPR.
Why Join Us?
33. Competitive salary and benefits package.
34. Opportunity to work with cutting-edge security technologies in a fast-paced environment.
35. Ongoing professional development and training support.
36. A collaborative culture that values innovation, teamwork, and work-life balance.
37. The chance to make a tangible impact on the security posture of a global organisation.
Job Req Type: ExperiencedRequired Travel: Yes, 10% of the timeShift Type: 1st Shift/Days