Epicareer Might not Working Properly
Learn More
E

Fulltime --- SOC L3 Analyst Location : Iselin NJ (100% onsite )

Salary undisclosed

Apply on

Availability Status

This job is expected to be in high demand and may close soon. We’ll remove this job ad once it's closed.


Original
Simplified

Role : SOC L3 Analyst

Location : Iselin NJ (100% onsite )

Must have : SOC , SOAR , Splunk ,SIEM , Strong expertise in EDR tools such as CrowdStrike, or similar.

- Experience with SOAR platforms and developing automated workflows and playbooks

Overview:

As a SOC L3 Analyst, you will be responsible for leading the investigation and response to complex security incidents, engineering advanced detection content, and optimizing security tools and processes. With a strong focus on Splunk, content engineering, Endpoint Detection and Response (EDR), and Security Orchestration, Automation, and Response (SOAR), you will enhance the SOC's capabilities to detect and mitigate advanced cyber threats.

Qualifications:

- Bachelor's degree in computer science, Information Security, or a related field, or equivalent experience.

- 8 to 11 years of experience in cybersecurity, with a focus on SOC operations, incident response, and security engineering.

- Proficiency with Splunk, including advanced search, dashboard creation, and content engineering.

- Strong expertise in EDR tools such as CrowdStrike, or similar.

- Experience with SOAR platforms and developing automated workflows and playbooks.

- Excellent analytical, problem-solving, and communication skills.

- Ability to work independently and as part of a team in a fast-paced environment.

Preferred Certifications:

- Certified Information Systems Security Professional (CISSP)

- GIAC Certified Incident Handler (GCIH)

- GIAC Certified Forensic Analyst (GCFA)

- Splunk Certified User/Power User/Architect

- Certified SOAR Analyst (CSA)

Working Conditions:

- This role requires working in shifts to provide 24/7 security monitoring

Key Responsibilities:

1. Advanced Incident Response:

- Lead the investigation and response to high-severity security incidents, performing deep-dive analysis and root cause determination.

- Develop and execute remediation plans to contain and eradicate threats.

2. Content Engineering:

- Design and develop advanced detection rules, alerts, and dashboards in Splunk to enhance threat detection capabilities.

- Continuously improve detection content based on emerging threats and attack patterns.

3. Endpoint Detection and Response (EDR):

- Utilize EDR tools (e.g., CrowdStrike, Carbon Black) to monitor, analyze, and respond to endpoint threats.

- Conduct advanced forensic analysis on compromised systems to identify indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) used by threat actors.

4. Security Orchestration, Automation, and Response (SOAR):

- Develop and maintain automated workflows and playbooks on the SOAR platform to streamline incident response processes.

- Integrate SOAR with other security tools and systems to automate threat detection, investigation, and response tasks.

5. Threat Hunting:

- Conduct proactive threat hunting activities to identify hidden threats and security weaknesses within the environment.

- Develop and implement threat hunting methodologies and use cases.

6. Collaboration and Mentoring:

- Collaborate with other SOC analysts, threat intelligence teams, and IT departments to improve overall security posture.

- Provide mentorship and guidance to L1 and L2 analysts, sharing knowledge and best practices.

7. Security Tool Optimization:

- Optimize the configuration and performance of security tools, including Splunk, EDR, and SOAR platforms.

- Evaluate and recommend new security technologies and solutions to enhance SOC capabilities.

8. Documentation and Reporting:

- Document incident response activities, findings, and outcomes in detail.

- Prepare comprehensive reports and briefings for senior management and stakeholders on security incidents and SOC performance.

9. Continuous Improvement:

- Stay updated with the latest cybersecurity threats, trends, and technologies.

- Participate in training and professional development activities to enhance skills and knowledge.


SOC L3 Analyst1SOCN/AFull Time,Full Time W2United States
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job