Senior SOC Analyst

Back to all jobs
  • Polymarket
  • New York, NY
  • Full-Time
  • 5 days ago
  • $150K – $210K
Polymarket
Published
May 15, 2026
Location
New York, NY
Job Type

Senior SOC Analyst: our view in 3 lines...

  • The Role: An experienced SOC analyst responsible for monitoring and responding to security events for a prediction market platform, working with internal teams and a third-party SOC.
  • The Person: Monitor and triage alerts from SIEM, EDR, NDR, and cloud tools, conduct threat hunting and malware analysis, lead incident containment and recovery, maintain SOC runbooks, and coordinate escalations with internal teams and a third-party SOC.
  • Requirements: Experience with a SIEM platform (Palo Alto XSIAM preferred), EDR/XDR tooling such as CrowdStrike or SentinelOne, TCP/IP, DNS, HTTP/S, and basic scripting or queries in Python, Bash, KQL, or SPL.

Job Description

About Polymarket

Polymarket is the world's largest prediction market platform. We enable individuals to express views on real-world events by trading on outcomes across politics, economics, sports, culture, and current affairs. Built as a peer-to-peer marketplace with no centralized "house," Polymarket aggregates diverse opinions into transparent, market-based probabilities that reflect collective expectations about the future.

We're growing fast — both in terms of volume ($21B traded in 2025) and adoption as an alternative news source. Our ambition is to become a ubiquitous beacon of truth in global media and we need your help adding fuel to the fire.

About the Role

Polymarket is looking for a SOC Analyst to join our internal security operations team. You'll be responsible for monitoring, triaging, and responding to security events across our environment — working alongside fellow in-house analysts and coordinating with our contracted 24/7 third-party SOC provider, serving as the escalation point for confirmed or ambiguous threats that require institutional context and hands-on response.

What You'll Do

  • Monitor SIEM, EDR, NDR, and cloud security tooling for alerts, anomalies, and indicators of compromise; review and triage escalations from the third-party SOC provider

  • Conduct proactive threat hunting using intelligence feeds, MITRE ATT&CK TTPs, and hypothesis-driven queries

  • Lead containment, eradication, and recovery for confirmed incidents; coordinate with Engineering, Legal, and Leadership on high-severity events

  • Respond to on-call pages per the team rotation schedule; write clear incident reports covering timeline, impact, root cause, and corrective actions

  • Analyze malware samples, phishing campaigns, network traffic, and endpoint artifacts to determine scope and attacker TTPs

  • Identify detection gaps and propose new SIEM rules, correlation logic, and tuning improvements

  • Author and maintain SOC runbooks and playbooks used by both in-house and third-party teams; contribute to weekly/monthly reporting on incident trends and third-party SLA adherence

What We're Looking For

  • 2+ years of hands-on SOC, incident response, or security operations experience

  • Proficiency with a SIEM platform (Palo Alto XSIAM preferred)

  • Experience with EDR/XDR tooling (CrowdStrike, SentinelOne, or equivalent)

  • Demonstrated ability to triage alerts including phishing, malware, lateral movement, and credential-based attacks

  • Solid understanding of TCP/IP, DNS, HTTP/S, and common attack patterns

  • Ability to read and write basic scripts or queries (Python, Bash, KQL, or SPL) to support analysis

  • Availability for rotating shifts and participation in on-call rotation

  • (Plus) Experience managing escalations to or from an MSSP or third-party SOC

  • (Plus) Certifications such as CompTIA CySA+, GCIA, GCIH, or equivalent

  • (Plus) Familiarity with cloud security tooling in AWS, GCP, or Azure

  • (Plus) Knowledge of the blockchain, DeFi, or crypto-sector threat landscape

  • (Plus) Experience with MITRE ATT&CK-based threat hunting or purple team exercises

Benefits

  • Competitive salary & equity

  • Unlimited PTO

  • Full Health, Vision, & Dental coverage

  • 401k match

  • Hardware setup: new MacBook Pro, big display, & accessories

Key Skills
? Key Skills in dark blue have been inferred based on similar industry roles
EDR/XDR Network Traffic Analysis Malware Analysis KQL SPL MITRE ATT&CK Express AWS Azure GCP Python SIEM TCP/IP DNS

Subscribe to Career Resources

Get the latest career advice, industry insights, and job opportunities delivered to your inbox.