JobTarget Logo

SOC Analyst III at VectorUSA – San Diego, California

VectorUSA
San Diego, California, 92101, United States
Posted on
Updated on
Salary:$125000 - $145000Job Function:General Business

Explore Related Opportunities

About This Position

VectorUSA

All qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, age, marital status, pregnancy, genetic information, or other legally protected status.
Position Title: SOC Analyst III

Position Overview

As a Security Operations Center (SOC) Analyst, you will serve as a critical part of our organizations cyber defense team. You will continuously monitor security platforms, analyze events, investigate potential threats, and support incident response efforts aimed at protecting both internal infrastructure and client environments.

This role is ideal for individuals who take initiative, enjoy handson problem solving, and want to build real operational experience working active security events.

Work Location

This is a full-time onsite position located in San Diego, CA. Analysts are expected to work in the SOC environment daily to collaborate closely with teammates, access secured systems, and respond to live incidents.

Security Requirements

    This role may support federal, government, or compliance regulated environments.
    Applicants must be able to pass a background check and meet eligibility requirements for a security clearance, if required by project assignment.
    U.S. citizenship may be required for certain federal enclave work.

Key Responsibilities

    Monitor security alerts and logs from SIEM, EDR, firewalls, and other enterprise security systems.
    Conduct triage of security events follow established SOC processes, escalation paths, and shift-handoff procedures with consistency.
    Investigate suspicious behavior, phishing emails, malware indicators, and anomalies across identities, networks and endpoints.
    Document investigations, maintain accurate ticketing records, and create incident summaries for senior staff.
    Assist with threat intelligence review, enrichment of alerts, and correlation of Indicators of Compromise (IoCs).
    Assist with tuning alert logic, identifying false positives, and suggesting improvements to playbooks and documentation.
    Work side-by-side with senior analysts and IT teams to troubleshoot incidents, validate findings, and execute response actions according to established procedures.
    Participate in shift rotations, weekend coverage, or oncall schedules as required for 24x7 operations.

Qualifications

Required:

    2+ years of experience in IT support, helpdesk, networking, or a security-related field (internships or school projects may qualify).
    Basic understanding of cybersecurity principles, vulnerabilities, malware, and common attack vectors.
    Familiarity with tools such as SIEM (e.g., Splunk, Sentinel etc.), EDR, firewalls, and ticketing systems.
    Ability to examine logs, alerts, and system behavior to form hypotheses and document conclusions clearly.
    Ability to analyze data, troubleshoot efficiently, and communicate clearly both verbally and in writing.

Preferred:

    Certifications such as CompTIA Security+, Network+, CISSP, CISM, or other credentials are not required, but may strengthen an application. Demonstrated practical experience, handson skills, or relevant project work may be considered equally, or more valuable than formal certifications.
    Hands-on experience with Windows/Linux systems.
    Associates or Bachelors degree in Cybersecurity, Computer Science, Information Technology, or related field.
    Familiarity with security bestpractice concepts, such as attack techniques, defensive controls, or common operational standards.
    Experience performing basic threat hunting or using SIEM search queries to investigate anomalous activity is a plus.

What We Offer

    Compensation Range Starting at: $100,000
    Career development and training opportunities.
    Hands-on experience with enterprise-level cybersecurity tools and environments.
    Work with a collaborative, experienced, and growing security team.
    Full benefits package including medical, dental, vision, 401(k), and paid time off.

What We Expect from Applicants

To be successful in this role, you should bring curiosity, initiative, and a willingness to learn. Applicants who stand out typically:

    Can explain why they are interested in SOC work.
    Has taken initiative to build practical experience, whether through labs, home projects, online learning platforms, cyber ranges, or other selfdirected practice.
    Pay attention to detail, especially in documentation.
    Are comfortable asking questions and working through technical challenges.

VectorUSA is a proud Equal Opportunity Employer/Veterans/Disabled. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.

Job Location

San Diego, California, 92101, United States

Frequently asked questions about this position

Latest Job Openings in California

Copy of Heavy Duty Journeyman Service Technician

Coast Counties Truck & Equipment Company
Paso Robles, CA

Respiratory Therapist (RT)

AdaptHealth LLC
Vacaville, CA

Mechanical Engineer

Astrophysics Inc.
City Of Industry, CA

Material Handler

B. Braun US Pharmaceutical Manufacturing LLC
Irvine, CA

Hydrogeologist

Montgomery & Associates
Sacramento, CA
Continue to apply
Enter your email to continue. You’ll be redirected to the employer’s application.
By clicking Continue, you understand and agree to JobTarget's Terms of Service and Privacy Policy.
Apply Now