BeiGene continues to grow at a rapid pace with challenging and exciting opportunities for experienced professionals. When considering candidates, we look for scientific and business professionals who are highly motivated, collaborative, and most importantly, share our passionate interest in fighting cancer.
General Description:
As a SOC Senior Analyst, you will play a critical role in BeiGene’s Information Security Operations, contributing to the detection, analysis, and response to cybersecurity threats. Reporting to the Senior Manager Information Security Operations, you will work closely with IT teams, security leadership, and third-party partners to monitor, investigate, and mitigate potential security incidents. Your expertise will drive continuous improvement in SOC processes, tools, and incident response capabilities while aligning with industry best practices.
Essential Functions of the job:
• Monitor and analyze security events using SIEM, EDR, and network monitoring tools to detect and respond to threats.
• Lead in-depth investigations of complex security incidents, determining root cause, impact, and mitigation steps.
• Serve as the primary escalation point for critical incidents requiring advanced analysis and coordination.
• Develop, maintain, and optimize SOP and playbooks to align with evolving threats and processes.
• Proactively conduct threat hunting to identify and mitigate undetected malicious activity.
• Collaborate with IT, business units, and vendors to remediate incidents and implement improvements.
• Develop and report on SOC metrics and KPIs to measure performance and incident response effectiveness.
• Deliver detailed incident reports and executive summaries to leadership and stakeholders.
• Participate in tabletop exercises and test incident response plans to identify gaps and improve readiness.
• Stay current on emerging threats, vulnerabilities, and mitigation strategies through threat intelligence research.
• Mentor and coach junior SOC analysts, fostering professional growth and continuous learning.
Supervisory Responsibilities:
• Oversee the work of junior SOC analysts by providing guidance, performance feedback, and technical support to ensure accurate analysis, effective incident response, and professional development.
• Lead and coordinate response activities across the SOC team, ensuring efficient escalation, proper task delegation, and timely resolution of critical security incidents.
Computer Skills: Proficient in security technologies such as SIEM, EDR, IDS/IPS, vulnerability management, and log analysis tools.
Requirements:
• 3+ years of hands-on experience in a SOC or equivalent security role, with exposure to incident response and threat analysis.
• Strong understanding of the Cyber Kill Chain, MITRE ATT&CK Framework, and modern threat actor techniques.
• Experience with security event monitoring and triage, including the analysis of logs and network traffic.
• Solid knowledge of endpoint security, network security fundamentals, and operating systems.
• Ability to conduct forensic analysis and identify indicators of compromise (IOCs).
• Strong verbal and written communication skills for both technical and non-technical audiences.
• Knowledge of compliance frameworks (e.g., NIST, ISO 27001) and their operational implications.
• Relevant certifications (e.g., GCIH, GCFA, or CompTIA CySA+).
Other Qualifications:
• Strong problem-solving and analytical skills, with a proactive approach to threat detection and mitigation.
• Ability to work in a fast-paced, dynamic environment, balancing multiple priorities.
• Commitment to continuous learning and staying updated on cybersecurity trends and technologies.
• Familiarity with scripting languages such as Python, PowerShell, or Bash to analyze security data, parse logs, and identify potential threats or anomalies during investigations.
Travel: Occasional travel may be required for training, conferences, or incident response support.
Permanent
Check similar offers
Practice your English before your job interview!