Rocket EMS logo

Rocket EMS

Cybersecurity SOC Engineer

Rocket EMS

📍 Santa Clara, United States 🇺🇸

full-time
senior
Posted —
Key Skills
SOC Azure KQL Python PowerShell
Industry
Aerospace Automotive

Job Description

Join Rocket EMS – Building Tomorrow’s Technology Today

At Rocket EMS , we don’t just build circuit boards — we bring cutting-edge technology to life. From Silicon Valley to Northern Nevada, our teams manufacture mission-critical electronics for the world’s most innovative companies. If you want to be part of a fast-growing team that pushes the limits of what’s possible, we have opportunities for you.


🚀 Why Rocket EMS?

  • Be part of a team building cutting-edge electronics used in aerospace, medical, automotive, and high-tech industries.
  • Work with advanced equipment in modern facilities located in California and Nevada .
  • Grow your skills and career in a company that values precision, innovation, and teamwork


Position Summary

Rocket EMS is seeking a highly skilled, hands-on Senior Cybersecurity SOC Engineer to join our elite, fast-growing Cybersecurity team. This is not a SOC Analyst, GRC, or managerial-only role — we’re looking for a true technical Subject Matter Expert (SME) with deep experience in SOC engineering, threat hunting, incident response, and cloud security.


Reporting to the Cybersecurity Manager , you will own and shape our SOC engineering practice across Microsoft Sentinel SIEM/SOAR , CrowdStrike EDR , Microsoft Defender for Endpoint (MDE) , Palo Alto Firewalls/IPS/IDS , CNAAP , and Azure cloud environments. You’ll lead the development and execution of Incident Response plans, tabletop exercises, threat hunting initiatives, alert optimization, and SOC automation projects.


Key Responsibilities

  • SOC Engineering & Optimization – Build, configure, and optimize Microsoft Sentinel SIEM/SOAR for on-premises and cloud environments; tune alerts, dashboards, and analytic rules.
  • Threat Hunting & Investigation – Conduct proactive threat hunting and deep-dive investigations across endpoints, network, on-prem, and Azure workloads.
  • SOAR Integration & Automation – Design and maintain automated playbooks leveraging Sentinel , CrowdStrike , MDE , and Palo Alto platforms; script automation in KQL , Python , and PowerShell .
  • Incident Response Leadership – Develop and maintain enterprise Incident Response (IR) plans; lead tabletop exercises and coordinate IR efforts across teams.
  • Cloud Security – Implement and investigate threats within Azure environments, including Microsoft 365 security , Entra ID (Azure AD) , Conditional Access , and adaptive MFA.
  • Data Feed Management – Onboard, normalize, and optimize log/data feeds from endpoints, networks, and security platforms.
  • Detection Engineering – Develop and fine-tune KQL queries , UEBA rules , and automation scripts for actionable threat detection.
  • Collaboration & Mentorship – Partner with Managed SOC teams, IT, and other stakeholders to optimize operations; mentor junior engineers.
  • Continuous Improvement – Conduct SOC gap analyses, enhance alert prioritization, and improve overall operational efficiency.


Required Experience & Skills

  • U.S. Citizen or Green Card holder (required)
  • 7+ years of hands-on SOC engineering or cybersecurity experience
  • Deep technical expertise in:
  • Microsoft Sentinel SIEM/SOAR (alerting, dashboards, KQL, automation)
  • CrowdStrike Falcon EDR (RTR, IOAs/IOCs, detection tuning)
  • Microsoft Defender for Endpoint (MDE) – endpoint and cloud
  • Palo Alto Firewalls, IPS/IDS, CNAAP
  • Azure cloud security and Microsoft 365 security services


Proven Experience With

  • Building and leading enterprise Incident Response plans and tabletop exercises
  • Threat hunting , advanced investigation, and mitigation
  • Data feed onboarding and normalization for SIEM platforms
  • Scripting and automation in KQL , Python , and PowerShell
  • Strong understanding of MITRE ATT&CK , adversary TTPs, and detection engineering principles
  • Excellent communication, mentorship, and cross-functional collaboration skills


Preferred Certifications

  • CISSP , GCFA , GCIH , GCTI , SC-200 , AZ-500 , or equivalent hands-on experience
  • MITRE ATT&CK Defender (MAD) , OSCP , Red Team , or other technical certifications