We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Security Operations Analyst - SIEM/SOAR experience required

FIS
United States, Florida, Jacksonville
Jan 09, 2026

Position Type :

Full time

Type Of Hire :

Experienced (relevant combo of work and education)

Education Desired :

Bachelor of Computer Science

Job Description

About FIS

Are you curious, motivated, and forward-thinking? At FIS you'll have the opportunity to work on some of the most challenging and relevant issues in financial services and technology. Our talented people empower us, and we believe in being part of a team that is open, collaborative, entrepreneurial, passionate and above all fun.

FIS' Cyber Security organizations secures the way we bank, pay, and invest. Securing the technology that moves $10 trillion annually, manages $40 trillion in invested assets, and processes payments for 8 of the top 10 internet companies, retailers, and airlines.

About the team

SOC analysts are the first to respond to cyber security incidents. They report on cyberthreats and implement any changes needed to inform and protect our customers. We continually research, utilize and provide the latest security solutions to deliver the finest service to our clients.

SOC analysts need to be detail oriented since they are responsible for monitoring many hardware, software solutions as well as other environmental elements simultaneously. They need to monitor the network and investigate and respond to all reported threats and events.

What you will be doing

  • Monitor SIEM platforms, network devices, and endpoint security tools to detect and analyze potential threats across client environments.
  • Perform triage and investigation of security alerts, assess severity and impact, and execute containment actions in line with client-specific playbooks.
  • Communicate effectively with clients during incident response, providing timely updates, clear explanations, and actionable recommendations.
  • Conduct in-depth investigations using threat intelligence and forensic techniques to identify root causes and attack vectors.
  • Document all incidents, actions taken, and outcomes in detailed reports tailored for client review and compliance requirements.
  • Collaborate with internal teams and clients to refine detection rules, improve response strategies, and enhance overall security posture.
  • Stay informed on emerging threats, vulnerabilities, and security technologies to proactively advise clients and strengthen defenses.

What you bring

  • A bachelor's degree (or the equivalent combination of education and training) in computer, science, information science or other related disciplines and 2-5 years' work experience.
  • Prior SOC/SIEM/SOAR experience or other security monitoring and response training.
  • Knowledge of security technologies (encryption, data protection, design, privilege access, etc.)
  • Professional skills in communications, decision making, presentation and project tracking.
  • Basic to intermediate decision-making and problem-solving skills.
  • Capable of establishing and maintaining effective working relationships with employees and/or clients.

What you bring

  • A bachelor's degree (or the equivalent combination of education and training) in computer, science, information science or other related disciplines and 2-5 years' work experience.
  • Prior SOC/SIEM/SOAR experience or other security monitoring and response training.
  • Knowledge of security technologies (encryption, data protection, design, privilege access, etc.)
  • Professional skills in communications, decision making, presentation and project tracking.
  • Basic to intermediate decision-making and problem-solving skills.
  • Capable of establishing and maintaining effective working relationships with employees and/or clients.

Bonus if you have

  • Experience with security network monitoring and response platforms.
  • Knowledge of basic security controls, vulnerability mitigation, etc.
  • Experience in advanced endpoint intrusion and response tools.
  • Experience SIEMPLIFY/Google Chronicles, CrowdStrike, LogRhythm, Azure Sentinel
  • Certified Ethical Hacker

Privacy Statement

FIS is committed to protecting the privacy and security of all personal information that we process in order to provide services to our clients. For specific information on how FIS protects personal information online, please see the Online Privacy Notice.

EEOC Statement

FIS is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, marital status, genetic information, national origin, disability, veteran status, and other protected characteristics. The EEO is the Law poster is available here supplement document available here

For positions located in the US, the following conditions apply. If you are made a conditional offer of employment, you will be required to undergo a drug test. ADA Disclaimer: In developing this job description care was taken to include all competencies needed to successfully perform in this position. However, for Americans with Disabilities Act (ADA) purposes, the essential functions of the job may or may not have been described for purposes of ADA reasonable accommodation. All reasonable accommodation requests will be reviewed and evaluated on a case-by-case basis.

Sourcing Model

Recruitment at FIS works primarily on a direct sourcing model; a relatively small portion of our hiring is through recruitment agencies. FIS does not accept resumes from recruitment agencies which are not on the preferred supplier list and is not responsible for any related fees for resumes submitted to job postings, our employees, or any other part of our company.

#pridepass

Applied = 0

(web-df9ddb7dc-vp9p8)