Senior SOC Analyst - Polymarket

Fully remote

Added
Locations
Type
Full-time

About Polymarket

Polymarket is the world's largest prediction market platform. We enable individuals to express views on real-world events by trading on outcomes across politics, economics, sports, culture, and current affairs. Built as a peer-to-peer marketplace with no centralized "house," Polymarket aggregates diverse opinions into transparent, market-based probabilities that reflect collective expectations about the future.

We're growing fast — both in terms of volume ($21B traded in 2025) and adoption as an alternative news source. Our ambition is to become a ubiquitous beacon of truth in global media and we need your help adding fuel to the fire.

About the Role

Polymarket is looking for a SOC Analyst to join our internal security operations team. You'll be responsible for monitoring, triaging, and responding to security events across our environment — working alongside fellow in-house analysts and coordinating with our contracted 24/7 third-party SOC provider, serving as the escalation point for confirmed or ambiguous threats that require institutional context and hands-on response.

What You'll Do

  • Monitor SIEM, EDR, NDR, and cloud security tooling for alerts, anomalies, and indicators of compromise; review and triage escalations from the third-party SOC provider
  • Conduct proactive threat hunting using intelligence feeds, MITRE ATT&CK TTPs, and hypothesis-driven queries
  • Lead containment, eradication, and recovery for confirmed incidents; coordinate with Engineering, Legal, and Leadership on high-severity events
  • Respond to on-call pages per the team rotation schedule; write clear incident reports covering timeline, impact, root cause, and corrective actions
  • Analyze malware samples, phishing campaigns, network traffic, and endpoint artifacts to determine scope and attacker TTPs
  • Identify detection gaps and propose new SIEM rules, correlation logic, and tuning improvements
  • Author and maintain SOC runbooks and playbooks used by both in-house and third-party teams; contribute to weekly/monthly reporting on incident trends and third-party SLA adherence

What We're Looking For

  • 2+ years of hands-on SOC, incident response, or security operations experience
  • Proficiency with a SIEM platform (Palo Alto XSIAM preferred)
  • Experience with EDR/XDR tooling (CrowdStrike, SentinelOne, or equivalent)
  • Demonstrated ability to triage alerts including phishing, malware, lateral movement, and credential-based attacks
  • Solid understanding of TCP/IP, DNS, HTTP/S, and common attack patterns
  • Ability to read and write basic scripts or queries (Python, Bash, KQL, or SPL) to support analysis
  • Availability for rotating shifts and participation in on-call rotation
  • (Plus) Experience managing escalations to or from an MSSP or third-party SOC
  • (Plus) Certifications such as CompTIA CySA+, GCIA, GCIH, or equivalent
  • (Plus) Familiarity with cloud security tooling in AWS, GCP, or Azure
  • (Plus) Knowledge of the blockchain, DeFi, or crypto-sector threat landscape
  • (Plus) Experience with MITRE ATT&CK-based threat hunting or purple team exercises

Benefits

  • Competitive salary & equity
  • Unlimited PTO
  • Full Health, Vision, & Dental coverage
  • 401k match
  • Hardware setup: new MacBook Pro, big display, & accessories

Go to job page

Apply for this position

Want to apply directly from the platform? Please use the form below.

Apply through SailOnChain

Connect your wallet to unlock the application form, as well as future benefits and rewards.

Or apply directly on the company's website via the link above.

Share job

Want to learn more about how the process works?

Read the documentation for information on the application process.

View Documentation
Apply at Polymarket
Apply Now →