Job Title: SOC Security Analyst L3 - Remote | WFH
Job Overview: We are looking for highly skilled and committed Security Operations Center (SOC) Analysts to join our innovative team. In this crucial role, you will be instrumental in safeguarding our diverse clientele against ongoing cyber threats. You will operate in a dynamic environment that emphasizes rapid identification, response, and mitigation of security incidents to minimize their impact and duration.
Key Responsibilities
- Lead the response to active threats and escalations from Level 1 and Level 2 analysts, utilizing your expertise to investigate client systems and logs for signs of infiltrators.
- Uphold exemplary standards of documentation and communication to ensure client awareness of incidents and necessary remedial actions.
- Monitor and evaluate security events from multiple sources, including SIEM logs and endpoint telemetry.
- Conduct thorough research on indicators and behaviors to assess reputational risks and identify anomalies.
- Execute detailed analyses of malware, attacker infrastructure, and forensic evidence.
- Manage complex investigative processes and oversee incident escalations.
- Perform live response analyses on compromised endpoints.
- Engage in proactive threat hunting based on anomaly detection and curated intelligence.
- Collaborate with incident response teams to address active threats, ensuring comprehensive identification and resolution of events.
- Contribute to the formulation and refinement of security policies and procedures.
- Mentor fellow analysts and act as a technical resource for junior team members.
- Maintain regular communication with clients to inform them of incidents and assist in remedial actions.
Required Skills
- Proficient in SIEM solutions, Cloud App Security tools, and EDR technologies.
- Advanced comprehension of network protocols and telemetry.
- Strong documentation and communication abilities, capable of simplifying complex technical topics for clarity.
- Expertise in identifying common attack vectors and malware detection methodologies.
- Basic programming knowledge in languages such as JavaScript, Python, Lua, Ruby, GoLang, or Rust is advantageous.
Qualifications
- A minimum of 5 years of practical experience in a SOC, TOC, or NOC setting.
- Demonstrated experience in intrusion analysis, incident response, or digital forensics is preferred.
- Relevant certifications such as GCIA and GCIH are essential; additional certifications like GCFA, GCFE, CISSP, Security+, Network+, CEH, RHCA, RHCE, MCSA, MCP, or MCSE are highly regarded.
- Familiarity with security technologies such as Sentinel, Splunk, Microsoft Defender suites, and CrowdStrike Falcon is beneficial.
- Understanding of IT infrastructure tools including GPO and Landesk is an asset.
Career Growth Opportunities
This position provides robust opportunities for professional advancement, allowing you to mentor junior analysts while contributing to strategic technological developments and process improvements.
Company Culture And Values
We pride ourselves on fostering a collaborative environment where continuous learning and mentorship are integral to our team dynamic. Our commitment to providing exceptional client service and maintaining high standards of integrity is at the core of our values.
Networking And Professional Opportunities
This role presents a unique chance to connect with a network of industry professionals, enhancing your skills and collaboration within a globally distributed team.
Compensation And Benefits
- Competitive salary based on experience
- Comprehensive health, dental, and vision coverage
- Retirement savings plan options
- Generous paid time off and holiday schedule
- Flexible working arrangements, including remote work opportunities
Join us in making a significant impact in the realm of cybersecurity. Your expertise will not only contribute to our clients’ safety but also to the continuous evolution of our security practices.
Employment Type: Full-Time