Lead Security Operations Analyst

Location:  Chicago, IL


A $30B+ global company which is in the midst of a major transformation to be a very nimble, open source development, and cloud enabled organization is seeking two Lead Senior Security Analysts.  This individual will perform level 3 responsibilities as the technical lead and incident responder for our client’s Security Operations Center (SOC) including leading technical investigations for security incidents, overseeing process improvements, and driving implementation of new capabilities.  Serve as a technical escalation resource for other SOC Analysts and provide mentoring for skill development.  Partner with Security Engineers to implement and improve technology and process to enhance SOC monitoring, investigation, and response.

  • Serve as an escalation resource and mentor for other analysts
  • Perform investigation and escalation for complex or high severity security threats or incidents
  • Work with SIEM Engineering and other security partners developing and refining correlation rules
  • Work on complex tasks assigned by leadership, which may involve coordination of effort among Level 1/2 analysts
  • Coordinate evidence/data gathering and documentation and review Security Incident reports
  • Assist in defining and driving strategic initiatives
  • Create and develop SOC processes and procedures working with Level 2 Analysts
  • Provide recommendations for improvements to the Security Policy, Procedures, and Architecture based on operational insights
  • Define and assist in creation of operational and executive reports
  • Define tool requirements to improve SOC capabilities
  • Provide leadership and technical guidance in project planning, task definition, estimating, reporting, scheduling, documentation, and workflow.


At least 5 years of experience in Information Security with an emphasis on Security Operations and Incident Response.  Experience with Splunk, ArcSight,  and Wireshark or related tools is ideal.  Detailed practical knowledge of Internet protocols as well as experience with configuring firewalls (Palo Alto), load balancers, routers, switches, IDS/IPS.  Ability to conduct multi-step breach and investigative analysis to trace the dynamic activities associated with advanced threats.  Advanced knowledge and expertise of using SIEM technologies for event investigation.  College degree in related field or equivalent work experience.

Preferred Competencies:

  • Advanced skill set with:
    • Event analysis leveraging SIEM tools
    • Incident investigation and response
    • Log parsing and analysis skill
    • Networking fundamentals (TCP/IP, network layers, Ethernet, ARP, etc)
    • Current threat landscape (threat factors, APT, cyber-crime, etc)
    • Malware operation and indicators
    • Penetration techniques
    • DDoS mitigation techniques
    • IDS/IPS systems
    • Windows and Unix or Linux
  • Moderate knowledge of:
    • Firewall and Proxy technology
    • Data Loss Prevention monitoring
    • Scripting
    • Forensic techniques
    • Protocol analysis experience (Wireshark, Gigastor, Netwitness, etc.)
    • Audit requirements (PCI, HIPPA, SOX, etc.)

Contact Information:

For immediate consideration please email a resume to jlentz@htassociates.com