1. Home
  2. Jobs
  3. Cybersecurity Analyst
  4. XTN-144F827 | L3 SOC ANALYST
KS
KMC Solutionskmc.solutions

XTN-144F827 | L3 SOC ANALYST

Worldwide (Remote)Full-time5h ago

About PsiQuantum

PsiQuantum is building the first useful quantum computers using silicon photonics and advanced semiconductor manufacturing. Protecting our research, infrastructure, and internal systems is critical to our mission.

Job Summary

PsiQuantum is seeking an L3 SOC Analyst to serve as a senior technical escalation point within Security Operations. This role focuses on complex investigations, alert analysis, and high-severity incident response. In addition to investigative responsibilities, this role collaborates with the Detection Lead to improve detection logic and contribute to custom rule development as well as strategic work to improve SOC tooling and processes. 

  • Comprehensive health benefits
  • Work flexibly from anywhere in over 20+ workspace locations
  • Access to KMC's exclusive pantry (MadMax Coffee, Fresh Fridge)
  • Diverse learning & growth opportunities
  • Accessible Cloud HR platform (Sprout)
  • Above standard leaves

Responsibilities

• Lead investigations of high-severity alerts and suspected security incidents.

• Perform advanced analysis across endpoint, network, identity, and cloud telemetry.

• Conduct root cause analysis and produce detailed incident documentation.

• Provide operational feedback to detection engineering on alert gaps and false positives.

• Assist with custom detection rule development and tuning during lower operational demand.

• Conduct proactive threat hunting activities.

• Support containment, eradication, and recovery efforts. 

• Mentor junior analysts and improve SOC investigation standards. 

Experience / Qualifications

• 3+ years of experience in SOC or incident response roles.

• Strong experience analyzing logs across endpoint, network, and cloud systems.

• Experience tuning or contributing to SIEM queries and detection logic.

• Familiarity with MITRE ATT&CK and adversary techniques.

• Strong knowledge of Windows, Linux, and identity-based attack patterns.

• Strong analytical, documentation, and communication skills. 

Additional relevant knowledge or experience related to the above requirements will be considered an advantage.