High Priority Position: SOC L3 Analyst || Remote at Remote, Remote, USA |
Email: [email protected] |
Dear Professional, Hope you are doing great today... This is BABU, BDM FROM PANTAR SOLUTIONS INC, we are an Information Technology and Business Consulting firm specializing in Project-based Solutions and Professional Staffing Services. Please have a look at below position which is with our Client and let me know your interest ASAP. I would really appreciate if you could send me your MOST RECENT UPDATED RESUME: Role: SOC L3 Analyst Location: Remote Duration: Long Term Contract Need strong SOC L3 Analyst with Cybersecurity, Incident response, Security engineering, Splunk, EDR tools (CrowdStrike or similar), SOAR platforms Exp. Consultant LinkedIn profile should be created before 2018 Need 8-11+ yrs of IT Exp. Profiles || Need Passport number, I94, Travel History documents during submission for TN1/H1/GC EAD/GC Job Description: SOC L3 Analyst (8 to 11 Years Experience) Overview: As a SOC L3 Analyst, you will be responsible for leading the investigation and response to complex security incidents, engineering advanced detection content, and optimizing security tools and processes. With a strong focus on Splunk, content engineering, Endpoint Detection and Response (EDR), and Security Orchestration, Automation, and Response (SOAR), you will enhance the SOC's capabilities to detect and mitigate advanced cyber threats. Key Responsibilities: 1. Advanced Incident Response: - Lead the investigation and response to high-severity security incidents, performing deep-dive analysis and root cause determination. - Develop and execute remediation plans to contain and eradicate threats. 2. Content Engineering: - Design and develop advanced detection rules, alerts, and dashboards in Splunk to enhance threat detection capabilities. - Continuously improve detection content based on emerging threats and attack patterns. 3. Endpoint Detection and Response (EDR): - Utilize EDR tools (e.g., CrowdStrike, Carbon Black) to monitor, analyze, and respond to endpoint threats. - Conduct advanced forensic analysis on compromised systems to identify indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) used by threat actors. 4. Security Orchestration, Automation, and Response (SOAR): - Develop and maintain automated workflows and playbooks on the SOAR platform to streamline incident response processes. - Integrate SOAR with other security tools and systems to automate threat detection, investigation, and response tasks. 5. Threat Hunting: - Conduct proactive threat hunting activities to identify hidden threats and security weaknesses within the environment. - Develop and implement threat hunting methodologies and use cases. 6. Collaboration and Mentoring: - Collaborate with other SOC analysts, threat intelligence teams, and IT departments to improve overall security posture. - Provide mentorship and guidance to L1 and L2 analysts, sharing knowledge and best practices. 7. Security Tool Optimization: - Optimize the configuration and performance of security tools, including Splunk, EDR, and SOAR platforms. - Evaluate and recommend new security technologies and solutions to enhance SOC capabilities. 8. Documentation and Reporting: - Document incident response activities, findings, and outcomes in detail. - Prepare comprehensive reports and briefings for senior management and stakeholders on security incidents and SOC performance. 9. Continuous Improvement: - Stay updated with the latest cybersecurity threats, trends, and technologies. - Participate in training and professional development activities to enhance skills and knowledge. Qualifications: - Bachelor's degree in computer science, Information Security, or a related field, or equivalent experience. - 8 to 11 years of experience in cybersecurity, with a focus on SOC operations, incident response, and security engineering. - Proficiency with Splunk, including advanced search, dashboard creation, and content engineering. - Strong expertise in EDR tools such as CrowdStrike, or similar. - Experience with SOAR platforms and developing automated workflows and playbooks. - Excellent analytical, problem-solving, and communication skills. - Ability to work independently and as part of a team in a fast-paced environment. Preferred Certifications: - Certified Information Systems Security Professional (CISSP) - GIAC Certified Incident Handler (GCIH) - GIAC Certified Forensic Analyst (GCFA) - Splunk Certified User/Power User/Architect - Certified SOAR Analyst (CSA) Working Conditions: - This role requires working in shifts to provide 24/7 security monitoring. PLEASE NOTE: If for any reason this does not interest you or you felt uncomfortable by any part of this email, I sincerely apologize. Please consider this E-mail as a request for referrals and feel free in forward this email to anyone whom you might find a fit. Thanks & Regards, Babu Pantar Solutions Inc 1908 Cox Rd, Weddington, NC 28104 Email: babu (dot) s (at) pantarsolutions (dot) com Keywords: information technology green card North Carolina High Priority Position: SOC L3 Analyst || Remote [email protected] |
[email protected] View all |
Fri Nov 01 18:36:00 UTC 2024 |