Senior Security Operations Engineer
Company: Cetera Financial Group
Location: Dallas, TX
Salary: $106,000 - $141,000 a year
Type: Full-time
Posted: 2026-03-30
About this role
We are at the forefront of transforming the future of technology in the financial industry, and we seek curious, practical individuals to help us pave the way. Our team is not intimidated by taking calculated risks, as they relish a good challenge and are eager to engage in problem-solving. As a member of our team, you will work alongside like-minded experts in a culture that is deeply rooted in innovation and progression. Join us to be part of a transformative journey that can shape the industry's future.
We are seeking a skilled and experienced SOC Analyst to play a crucial role in monitoring and analyzing our organization's security infrastructure, detecting and responding to potential threats and incidents, and ensuring the overall security of our systems.
What you will do:
- Continuously monitor and triage security events and alerts across multiple platforms—such as Next-Gen SIEM, Microsoft 365 Defender, AWS native security, and other enterprise security tools—to identify anomalous activity, policy violations, and potential indicators of compromise (IOCs). This includes validating alert fidelity, escalating true positives, suppressing false positives, and maintaining situational awareness across the environment.
- Perform in‑depth analysis and investigation of security incidents by correlating logs, endpoint telemetry, network traffic, identity activity, and threat intelligence to determine root cause, scope, impact, MITRE ATT&CK technique alignment, and potential business risk. This includes detailed investigation timelines, document evidence, and recommend containment, eradication, and recovery actions.
- Conduct proactive threat hunting using hypotheses based on emerging threats, adversary TTPs, behavioral analytics, and environmental risk indicators. Leverage SIEM queries, EDR telemetry, cloud audit logs, and threat intel feeds to identify stealthy threats such as lateral movement, persistence mechanisms, privilege misuse, or unauthorized data access...