Home

Remote SOC L2 Analyst/Security Analyst at Remote, Remote, USA
Email: [email protected]
SOC L2 Analyst/Security Analyst

No H1B

Remote

$55/hr C2C

Must have
LinkedIn

Domain : 
Finance

The manager has
mentioned that they do not want to see Engineers and they are more interested
in people who are specifically 
Analysts. They
need to be hands on with AWS Security and well-versed in Splunk for monitoring.
The manager also mentioned that they would like to see candidates that are
heavier on the incident response skillset for this role too. The position is
now remote but because of that they are more strict on the requirements. All
visas are accepted and candidates must have a valid LinkedIn profile. I have
included the job details below but the most important aspect will be to find a
true 
Analyst who is working in 
SOC that has hands on AWS Security, splunk and
incident response related experience. Please do not submit any engineers
as they are only seeking analysts. Please also do not submit anyone with
an audit focused background. The compensation is $65/Hour and the project is
ongoing until December 2026. Please let me know if you have any questions.

Types of people
they are looking for: 

Mid
Level 
SOC and Incident Response 
Analyst, preferably someone in either banking, consulting
firms, or other large network places. Someone who is extremely passionate
about this even outside of work, preferably with their own youtube, website or
side projects. 

Project
Details: 

This
group sits within security and run the 
SOC (Security
Organization Center). They are first line of defense and perform incidence
response to malicious activity happening at the bank.

They essentially monitor, detect, analyze, and
respond to cyber threats around the clock. They put implementations into the
security tools and monitor these tools. This is an extremely fast past
environment, candidate must be able to thrive in this type of environment.

Required
Skills: 

(Top
Skills: SOC, Incident Response, AWS Security, Splunk, (Government OR Military
or DOD background), certification in any of the following GCIA, GCIG or GIAC.

Strong understanding of protocols and inherent process of how to
triage alerts. Strong experience with Incident Response.

Azure/AWS security experience, GCIA, GCIH, or other GIAC
certifications preferred

Azure VPCs/IAM and AWS Guard Duty

Splunk practical experience.- cert a plus

Experience with CrowdStrike, Proofpoint, Palo Alto, Akamai
(determine if its

a bot and prevent server overload)

Able to participate in a rotating On-Call schedule for
after-hours information security events / incidents;

Good communication skills customer facing calm even
demeanor when challenged, proactive, team player who works well with others and
work well collaboratively. Able to challenge respectfully and look for
opportunities for continuous improvement. Able to mentor and coach junior team
members

Financial Services exp

--

Keywords: information technology
Remote SOC L2 Analyst/Security Analyst
[email protected]
[email protected]
View all
Tue Jul 09 22:43:00 UTC 2024

To remove this job post send "job_kill 1544711" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 0

Location: ,