
Sr Security Analyst
- Irving, TX
- Permanent
- Full-time
- {{$parent.googlePlacesAutocompleteEnabled ? location.description : location}}
0" ng-cloak> * {{keyword}}Location:
0" ng-cloak> * {{$parent.googlePlacesAutocompleteEnabled ? location.description : location}}Locations (up to three): {{$item.description}} {{$parent.googlePlacesAutocompleteEnabled ? location.description : location}}Join a company that feels like homeKeyword:
0" ng-cloak> * {{keyword}}Location:
0" ng-cloak> * {{$parent.googlePlacesAutocompleteEnabled ? location.description : location}}Locations (up to three): {{$item.description}} {{$parent.googlePlacesAutocompleteEnabled ? location.description : location}}Sr Security Analyst in Irving, TX at LennarDate Posted: 25/8/2025Share With:Job SnapshotEmployee Type:Full-TimeLocation:Experience:Not SpecifiedDate Posted:25/8/2025Job ID:R25_0000003448CategoryCorporate TechnologyCompanyLennarJob DescriptionWe are LennarLennar is one of the nation's leading homebuilders, dedicated to making an impact and creating an extraordinary experience for their Homeowners, Communities, and Associates by building quality homes and providing exceptional customer service, giving back to the communities in which we work and live in, and fostering a culture of opportunity and growth for our Associates throughout their career. Lennar has been recognized as a Fortune 500® company and consistently ranked among the top homebuilders in the United States.Join a Company that Empowers you to Build your FutureWe are seeking a highly skilled and experienced Senior SOC Analyst (Tier 3) to join our cybersecurity team. This role is critical in leading advanced incident response efforts, managing escalations from cross functional teams and working closely with our MDR partner to ensure rapid detection, containment, and remediation of security threats. The ideal candidate will have deep technical expertise, strong analytical skills, and a proactive mindset toward incident response and continuous improvement.A career with purpose.A career built on making dreams come true.A career built on building zero defect homes, cost management, and adherence to schedules.Your Responsibilities on the TeamIncident Response & Threat ManagementLead investigations of complex security incidents and coordinate response efforts across internal teams and MDR partner.Perform root cause analysis and develop remediation plans for high-severity incidents.Act as the primary escalation point for Tier 3 alerts/incidents.Develop and maintain incident response playbooks and workflows.Serve as a liaison between internal SOC and MDR provider to ensure alignment on threat detection, response protocols, and escalation procedures.Review and validate MDR alerts, ensuring appropriate triage and response.Provide feedback and tuning recommendations to MDR partner to improve detection capabilities.Analyze threat actor tactics, techniques, and procedures (TTPs) and apply findings to improve defenses.Security Monitoring & AnalysisMonitor and analyze logs and alerts from various security tools (SIEM, EDR, NDR, etc.).Correlate data across multiple sources to identify patterns and anomalies.Maintain situational awareness of the threat landscape and internal security posture.Reporting & DocumentationDocument incident timelines, findings, and lessons learned.Generate executive-level and technical reports on SOC performance and incident metrics.Contribute to compliance and audit efforts by maintaining accurate records and evidence.RequirementsMinimum 4-5 years of experience in cybersecurity operations role, with at least 2 years in a previous Tier 2/Tier 3 SOC analyst capacity.CompTIA Security+ or equivalent.Proven experience in incident response triage, investigation, and working with MDR partners.In-depth knowledge of security tools and technologies, including SIEM/SOAR platforms (e.g., Microsoft Sentinel), endpoint detection and response (EDR) solutions (e.g., Palo Alto Cortex XDR, Microsoft Defender), and ticketing systems (e.g., ServiceNow).Strong understanding of network security concepts, operating systems, and malware analysis techniques.Familiarity with MITRE ATT&CK framework and threat intelligence platforms.Excellent analytical, problem-solving, and communication skills.Ability to work under pressure and manage multiple priorities.PreferredCertifications such as CISSP, GCIA, GCIH, CySA+, eJPT/PJPT, CEH, SC-200 or equivalent.Experience with cloud security (AWS, Azure).Experience with Microsoft Sentinel, Proofpoint, Palo Alto Cortex XDR.Scripting skills (Python, PowerShell) for automation and analysis.Physical & Office/Site Presence Requirements:
- Mandatory 4-days onsite; 1-days remote. May transition to 5-days onsite.
- On-call rotation may be required for critical incident response.
- Cookie Preferences