Description
Role Snapshot
As a key member of the Security Operations Center (SOC), our Principal SOC Analyst serves as the first line of defense in WPS's highly secure and regulatory-compliant environment, delivering innovative solutions. This senior analyst brings advanced cybersecurity expertise to lead and mentor other SOC analysts, develop and optimize monitoring tools, procedures, and ensure clear, effective communication with auditors and business stakeholders. This Principal SOC Analyst plays a critical role in guiding complex security initiatives, responding to incidents, and driving continuous improvement across SOC operations.
Salary Range
$125,000 ~ $160,000
The base pay offered for this position may vary within the posted range based on your job-related knowledge, skills, and experience.
Work Location
Our first consideration will be to have this new employee live in the state of Wisconsin to take advantage of Hybrid work and collaboration. Employees within 45 miles of WPS Headquarters (1717 W. Broadway in Madison, WI) will be expected to be able to be able to work Hybrid 3 days a week on a regular basis.
**As a secondary consideration, we do offer remote work in the following approved states:
Colorado, Florida, Georgia, Illinois, Indiana, Iowa, Michigan, Minnesota, Missouri, Nebraska, New Jersey, North Carolina, Ohio, South Carolina, Texas, Virginia, Wisconsin
How do I know this opportunity is right for me If you:
Enjoy leading security incident response by managing the end-to-end process, including preparation, detection, containment, eradication, recovery, and post-incident analysis.
Have coordinated testing, simulations, and training exercises to ensure team readiness.
Like to provide expert-level guidance and mentorship to SOC analysts, fostering skill development, knowledge sharing, and continuous improvement in threat detection and response capabilities.
Thrive when designing, implementing, and maintaining SOC monitoring solutions, tools, and procedures to enhance threat visibility, detection accuracy, and operational efficiency.
Can represent the SOC function in audits, vendor discussions, cross-functional meetings, and other engagements, ensuring clear communication of security posture and operational effectiveness.
Enjoy developing, reviewing, and maintaining comprehensive SOC documentation, including standard operating procedures (SOPs), incident handling playbooks, and monitoring protocols to support operational consistency and compliance.
Can serve in an on-call capacity to support the Security Operations Center (SOC) and Incident Response Manager during security incidents, ensuring timely escalation, coordination, and resolution of critical events outside of regular business hours.
Minimum Qualifications
U.S. citizenship is required for this position due to Department of Defense restrictions.
Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or related field, or equivalent education and/or relevant work experience.
7 or more years of progressive cybersecurity experience, with strong expertise in Security Operations Center (SOC) activities, including incident detection, analysis, containment, and recovery in complex enterprise environments.
Security Operations Center experience that includes:
Proficient with Security Information and Event Management (SIEM) platforms, including log correlation, alert tuning, and threat detection strategies.
Experienced in applying the MITRE ATT&CK framework and aligning security operations with standards such as NIST, CMMC, and MAC-ARS controls in regulated environments.
Solid technical background in network security, cloud security architectures (AWS, Azure), and emerging AI/ML security principles for threat mitigation and SOC automation.
Working knowledge of scripting languages (PowerShell, Python) and foundational sk
CLZUU DOMUU SK111 SK222 SK333 SK444 SK555 SK666