Remote SOC L2 Analyst/Security Analyst at Remote, Remote, USA |
Email: [email protected] |
SOC L2 Analyst/Security Analyst No H1B Remote $55/hr C2C Must have Domain : Finance The manager has mentioned that they do not want to see Engineers and they are more interested in people who are specifically Analysts. They need to be hands on with AWS Security and well-versed in Splunk for monitoring. The manager also mentioned that they would like to see candidates that are heavier on the incident response skillset for this role too. The position is now remote but because of that they are more strict on the requirements. All visas are accepted and candidates must have a valid LinkedIn profile. I have included the job details below but the most important aspect will be to find a true Analyst who is working in SOC that has hands on AWS Security, splunk and incident response related experience. Please do not submit any engineers as they are only seeking analysts. Please also do not submit anyone with an audit focused background. The compensation is $65/Hour and the project is ongoing until December 2026. Please let me know if you have any questions. Types of people they are looking for: Mid Level SOC and Incident Response Analyst, preferably someone in either banking, consulting firms, or other large network places. Someone who is extremely passionate about this even outside of work, preferably with their own youtube, website or side projects. Project Details: This group sits within security and run the SOC (Security Organization Center). They are first line of defense and perform incidence response to malicious activity happening at the bank. They essentially monitor, detect, analyze, and respond to cyber threats around the clock. They put implementations into the security tools and monitor these tools. This is an extremely fast past environment, candidate must be able to thrive in this type of environment. Required Skills: (Top Skills: SOC, Incident Response, AWS Security, Splunk, (Government OR Military or DOD background), certification in any of the following GCIA, GCIG or GIAC. Strong understanding of protocols and inherent process of how to triage alerts. Strong experience with Incident Response. Azure/AWS security experience, GCIA, GCIH, or other GIAC certifications preferred Azure VPCs/IAM and AWS Guard Duty Splunk practical experience.- cert a plus Experience with CrowdStrike, Proofpoint, Palo Alto, Akamai (determine if its a bot and prevent server overload) Able to participate in a rotating On-Call schedule for after-hours information security events / incidents; Good communication skills customer facing calm even demeanor when challenged, proactive, team player who works well with others and work well collaboratively. Able to challenge respectfully and look for opportunities for continuous improvement. Able to mentor and coach junior team members Financial Services exp -- Keywords: information technology Remote SOC L2 Analyst/Security Analyst [email protected] |
[email protected] View all |
Tue Jul 09 22:43:00 UTC 2024 |