Home

Urgent Req. of SOC Analyst - Dallas, TX (onsite) - Contract Role at Dallas, Texas, USA
Email: kolishivangi123@gmail.com
Hello 

Hope you are doing well!

We have an opportunity for
Cyber Threat Hunting Analyst. Please
see the job details below and let me know if you would be interested in this
role. If interested, please send me a copy of your resume, your contact
details, your availability and a good time to connect with you.

Location:
Dallas, TX (onsite)

Term: Contract
Role

Visa: H1B

Job
Description:

Bachelors degree in Cybersecurity, Information
Technology, Computer Science or a related field; advanced degree preferred.

4+ years of experience in the cybersecurity
industry, with demonstrated roles in SOC, Incident Response, Threat
Intelligence, Malware Analysis, IDS/IPS Analysis, or related functions.

Proven ability to independently investigate and
analyze alerts for anomalous, suspicious, or malicious activity in a corporate
environment and support remediation efforts.

Experience conducting proactive threat hunts,
including developing custom search criteria and identifying intrusions or
potential incidents.

Strong understanding of cyber adversarial tactics,
techniques, and procedures (TTPs) related to Cyber Crime, Malware, Botnets,
Hacktivism, Social Engineering, APTs, and Insider Threats.

Proficient in Endpoint Detection and Response (EDR)
tools and capabilities, with hands-on experience using CrowdStrike, Microsoft
Defender, and other major vendors.

Foundational knowledge of Digital Forensics and
Incident Response (DFIR) processes.

Experience with large dataset analysis and log
analysis tools, including Securonix, Snowflake, Python, Pandas, and SQL.

Skilled in using Regular Expressions, YARA, SIGMA
rules, FQL, KQL, and at least one scripting language such as Python,
Power, or PERL.

Strong understanding of cyber adversarial frameworks
like MITRE ATT&CK and Lockheed Martins Cyber Kill Chain.

Hands-on experience hunting for Indicators of
Compromise (IOCs) in SIEM and EDR tools such as Securonix, Microsoft Defender,
Microsoft Purview, Microsoft Sentinel, Palo Alto XSOAR, ThreatConnect, and
Recorded Future.

Excellent written and verbal communication skills
with the ability to explain technical threat hunt objectives and findings to
both technical and non-technical audiences, effectively communicating
associated risks.

Certifications such as Network+, Security+, CISSP,
CISM, GCIH, GCFA, and/or cloud-specific certifications like AWS Cloud
Practitioner, AWS Certified Security - Specialty, and Microsoft Certified:
Azure Security Engineer Associate.

Key
Responsibilities:

Act as a trusted advisor on advanced threat hunting
operations, proactively identifying threats, insider misconduct, and anomalous
behavior.

Lead hunt missions by leveraging threat
intelligence, multi-source data, and brainstorming sessions to uncover
malicious activity.

Utilize advanced threat hunting techniques and tools
to detect, analyze, and respond to security threats. This includes identifying
threat actor groups, analyzing command and control (C2) structures, and
developing network and host-based Indicators of Compromise (IOCs) or Indicators
of Attack (IOAs).

Investigate and analyze alerts for suspicious or
malicious activity across corporate environments, supporting remediation
efforts.

Develop and execute proactive threat hunting
methodologies, including defining search criteria to uncover undetected
threats.

Identify and address detection gaps by collaborating
with Cyber Security stakeholders to enhance security controls and processes.

Evaluate and recommend security tools and
technologies for threat analysis, impact assessment, and mitigation.

Conduct root cause analysis, review incident lessons
learned, and support compliance audits to improve security posture.

Participate in threat hunting exercises and tabletop
simulations to strengthen cyber resilience.

Mentor team members, sharing knowledge and best
practices to enhance their technical capabilities.

Detect and respond to threats using security
solutions such as SIEM, data lakes, and cloud platforms.

Support threat response efforts and conduct ad-hoc
threat hunts as needed.

Maintain technical proficiency in Information
Security controls, including endpoint, cloud, SaaS, identity, and network
security.

Demonstrate expertise in Endpoint Detection and
Response (EDR) tools and techniques.

Apply foundational knowledge of Digital Forensics
and Incident Response (DFIR) processes to threat investigations.

         Thanks and Regards
,

www.alphasilicon.com

Camino Real Santa Clara Town Centre Suite 1047, Santa Clara CA-95050

Shivangi

Talent Acquisition Associate

Email Id:

shivangi@alphasilicon.us

--

Keywords: active directory information technology wtwo California Idaho Texas
Urgent Req. of SOC Analyst - Dallas, TX (onsite) - Contract Role
kolishivangi123@gmail.com
https://jobs.nvoids.com/job_details.jsp?id=2291144
kolishivangi123@gmail.com
View All
02:15 AM 27-Mar-25


To remove this job post send "job_kill 2291144" as subject from kolishivangi123@gmail.com to usjobs@nvoids.com. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to kolishivangi123@gmail.com -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at me@nvoids.com


Time Taken: 11

Location: Dallas, Texas