cover image
Live Nation Entertainment

Lead Security Operations Center (SOC) Analyst

Remote

Nevada, United states

Senior

Full Time

02-02-2026

Share this job:

Skills

Communication Leadership Incident Response Quality Assurance Training Coaching Azure AWS Marketing GCP

Job Specifications

Job Summary

WHO ARE WE?

Live Nation Entertainment is the world’s leading live entertainment company, comprised of global market leaders: Ticketmaster, Live Nation Concerts, and Live Nation Media & Sponsorship. Ticketmaster is the global leader in event ticketing with over 620 million tickets sold annually and approximately 10,000 clients worldwide. Live Nation Concerts is the largest provider of live entertainment in the world promoting more than 50,000 events annually for nearly 7,000 artists in 40+ countries. These businesses allow Live Nation Media & Sponsorship to create strategic music marketing programs that connect more than 1,200 sponsors with the 145 million fans that attend Live Nation Entertainment events each year. For additional information, visit www.livenationentertainment.com.

WHO ARE YOU?

Passionate and motivated. Driven, with an entrepreneurial spirit. Resourceful, innovative, forward thinking and committed. At Live Nation Entertainment, our people embrace these qualities, so if this sounds like you then please read on!

THE TEAM

Live Nation Entertainment is the world’s largest live entertainment company, composed of global market leaders: Ticketmaster, Live Nation Concerts, and Live Nation Media & Sponsorship. With 550 million fans and operations in over 40 countries, our security mission is to ensure those experiences remain uninterrupted and safe. The Detection and Response Team (DART) plays a key role in maintaining that trust, security, and resilience.

THE ROLE

As a US Lead Security and Operations (SOC) Analyst, you will serve as the bridge between frontline analysts and DART management, helping guide real-time incident response, providing mentorship and quality assurance across shifts, and contributing to process development and strategic improvement. You will lead shift operations, act as an escalation point for complex investigations, and ensure consistent application of incident response processes across global teams.

What This Role Will Do

Operational Leadership

Coordinate daily DART shift activities to ensure smooth operations and adequate coverage.
Act as an escalation point for high-priority security alerts and investigations.
Conduct QA reviews on tickets to ensure accuracy, completeness, and adherence to IR procedures.
Lead shift handovers, ensuring continuity and communication across regions.

Incident Response

Monitor, query, and triage security alerts using SIEM, EDR, and NDR platforms.
Perform in-depth investigations into potential threats, applying TTP-based analysis and leveraging internal tools.
Collaborate with business units and technical teams during incident response to gather context and execute containment or remediation.
Provide structured documentation and recommendations post-incident.

Team Support & Development

Mentor junior and mid-level analysts during investigations and incident response.
Support onboarding and continuous training through documentation, coaching, and hands-on guidance.
Promote a culture of collaboration, accountability, and continuous improvement across shifts.

Process & Tooling Contribution

Help identify tooling or workflow gaps; provide recommendations to the DART Manager for improvements.
Contribute to the creation and refinement of playbooks and operational procedures.
Participate in tuning detection content and use-case development in partnership with threat detection teams.

Reporting & Metrics

Assist in tracking key performance indicators (Time to Detect, Time to Resolve, Escalation Ratios, etc.).
Support reporting functions by summarizing incidents and shift activities in alignment with team OKRs.

What This Person Will Bring

5+ years of experience in a cybersecurity analyst role, with at least 2 years in a lead or senior-level capacity.
Proven hands-on experience with SIEM, EDR, NDR, and DFIR toolsets.
In-depth understanding of attacker TTPs (MITRE ATT&CK) and strong investigative mindset.
Experience responding to incidents in cloud environments (AWS, Azure, GCP).
Excellent written and verbal communication skills, especially in cross-functional and high-pressure scenarios.
Ability to guide and inspire analysts of varying experience levels.
Ability to work 9:00AM-5:00PM EST/CST/PST

Additional Expectations

Participate in a 24/7 on-call rotation
Demonstrate flexibility and ownership during incidents and surge periods.
Collaborate closely with the DART Manager on planning, capacity tracking, and continuous team improvement.

Preferred Certifications

At least two of the following (or equivalent experience):
GIAC Security Expert (GSE)
GIAC Certified Incident Handler (GCIH)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Certified Incident Handler (GCIH)
GIAC Certified Intrusion Analyst (GCIA)
CompTIA Cybersecurity Analyst (CySA+)
OSCP – Offensive Security Certified Professional
CISSP – Certified Information Systems Security Professional
Microsoft Certified: Cybersecurity Architect Expert or AWS Certified Security
CompT

About the Company

Recognized three years in a row by Great Place to Work® and named one of People Magazine’s Top 50 Companies that Care, Live Nation Entertainment is the global leader in live events and ticketing. With business operations and corporate functions across major divisions including Ticketmaster, Concerts, Media & Sponsorship and Artist Nation, we offer exciting opportunities across every discipline. Generous vacation, healthcare, and retirement benefits are just some of the perks we offer our full-time, global workforce. For any... Know more