Senior SOC Analyst
Job
N-able
Remote
Full-Time
Review key factors to help you decide if the role fits your goals.
Pay Growth
?
out of 5
Not enough data
Not enough info to score pay or growth
Job Security
?
out of 5
Not enough data
Calculating job security score...
Total Score
93
out of 100
Average of individual scores
Skill Insights
Compare your current skills to what this opportunity needs—we'll show you what you already have and what could strengthen your application.
Job Description
Why N-able At N-able, we're not just helping businesses be secure —we're redefining what it means to be cyber resilient. Our end-to-end platform blends AI-powered capabilities and flexible tech stacks, so customers can manage, secure, and recover with confidence. But the real power behind it all? Our people. We're a global crew of N-ablites, who love solving complex problems, sharing knowledge, and delivering solutions that actually make a difference. If you're into meaningful work, fast growth, and a team that's got your back, you'll be surrounded by people who believe in what they do—and in you. Join a team where you can make a difference! The Senior SOC Analyst is an experienced cybersecurity professional responsible for handling complex and high-priority security inquiries, incidents, and service requests. Acting as a technical expert and mentor to Analysts, the Senior SOC Analyst plays a crucial role in ensuring swift and accurate resolutions, guiding technical topics, and serving as a critical escalation point. Please note that this role is on-site, therefore working in the Morrisville Collaboration Hub 3+ times per week is required. What You'll Do Lead IH engagements from containment through eradication and recovery planning. Provide technical and procedural guidance to customers during active incidents. Conduct root-cause analysis and determine long-term remediation steps. Perform deep-dive analysis of attacker TTPs, persistence mechanisms, and lateral movement. Review forensic artifacts from endpoints, networks, and cloud environments. Correlate indicators of compromise to broader attack campaigns and threat actors. Act as a primary point of contact for customers during incident engagements. Deliver technical findings and recommendations to both technical and executive stakeholders. Provide remediation roadmaps tailored to customer environments. Partner with operational MDR team analysts to transition containment into IH workflows. Collaborate with operational MDR Teams for intelligence gathering and validation. Contribute to IH playbook development and improvement. Provide mentorship and peer review for junior analysts. Share lessons learned with SOC leadership to improve service delivery. What You'll Bring 4-6 years of experience in SOC, Managed Detection Response, or equivalent cybersecurity role. Proven experience handling escalations and complex investigations. Bachelor's degree in Cybersecurity, IT, or related field (or equivalent experience). Advanced knowledge of SOC operations, incident support, and analysis techniques. Ability to mentor and support less experienced analysts. Excellent communication skills for both technical and non-technical audiences. High proficiency with SIEM, IDS/IPS, EDR, and related tools. Analytical and detail-oriented with a passion for solving problems. Strong mentor and team player. Calm and dependable under high-pressure situations. Ethical, professional, and dedicated to customer security. Ability to work on a 24/7 shifting model. The standard shift is 9am-6pm EST, either Tuesday-Saturday or Sunday-Thursday. Purple Perks What do we offer you? Fully covered medical, dental and vision
- for employee and eligible dependents! Generous PTO and observed holidays 2 Paid VoluNteer Days per year Paid Parental Leave 401(k) with company-match and Flexible Spending Accounts Employee Stock Purchase Program On-site gym access at select Collaboration Hubs Wellness rewards FuN
- raising opportunities as part of our giving program N
- ablite Learning
- custom learning experience as part of our investment in you The Way We Work
- our hybrid working model based on trust and flexibility About N-able At N-able , our mission is to protect businesses against evolving cyberthreats with an end-to-end cyber resilience platform to manage, secure, and recover.
Qualifications:
4-6 years of experience in SOC, Managed Detection Response, or equivalent cybersecurity role. Proven experience handling escalations and complex investigations. Bachelor s degree in Cybersecurity, IT, or related field (or equivalent experience). Advanced knowledge of SOC operations, incident support, and analysis techniques. Ability to mentor and support less experienced analysts. Excellent communication skills for both technical and non-technical audiences. High proficiency with SIEM, IDS/IPS, EDR, and related tools. Analytical and detail-oriented with a passion for solving problems. Strong mentor and team player. Calm and dependable under high-pressure situations. Ethical, professional, and dedicated to customer security. Ability to work on a 24/7 shifting model. The standard shift is 9am-6pm EST, either Tuesday-Saturday or Sunday-Thursday.Similar remote jobs
Veolia Environnement SA
Minnetonka, MN
Posted2 days ago
Updated12 hours ago
Cloud for Good
Asheville, NC
Posted2 days ago
Updated12 hours ago
Emory University
Atlanta, GA
Posted2 days ago
Updated12 hours ago
Similar jobs in Morrisville, NC
Syneos Health
Morrisville, NC
Posted2 days ago
Updated12 hours ago
Syneos Health
Morrisville, NC
Posted2 days ago
Updated12 hours ago
Similar jobs in North Carolina
ThermoFisher Scientific
Greensboro, NC
Posted2 days ago
Updated12 hours ago
CGI Technologies and Solutions, Inc.
Charlotte, NC
Posted2 days ago
Updated12 hours ago
Wells Fargo
Charlotte, NC
Posted2 days ago
Updated12 hours ago