Match score not available

Remote SOC Tier 3 Security Analyst | WFH

Remote: 
Full Remote
Contract: 
Experience: 
Senior (5-10 years)
Work from: 
Texas (USA), United States

Offer summary

Qualifications:

8 years of experience in Security Incident Response or SOC, Extensive knowledge of SIEM technologies, CompTIA Security+ certification required, Proficiency in Splunk Enterprise Security, Additional certifications like CEH and GCIH preferred.

Key responsabilities:

  • Analyze network traffic for threats
  • Document and escalate incidents thoroughly
  • Conduct cyber defense trend analysis and report
  • Investigate malicious activities and recommend enhancements
  • Collaborate on developing SOC operational procedures
Get It Recruit- Real Estate logo
Get It Recruit- Real Estate Human Resources, Staffing & Recruiting XLarge https://www.get.it/
2 - 10 Employees
See more Get It Recruit- Real Estate offers

Job description

Job Overview

We are actively seeking a dedicated and experienced Security Operations Center (SOC) Analyst to join our dynamic team remotely. In this critical role, you will play a key part in performing in-depth investigations and proactive threat hunting to effectively identify and mitigate security risks. Candidates with a solid background in SIEM technologies and robust cybersecurity knowledge are encouraged to apply.

Key Responsibilities

  • Analyze network traffic for the detection of potential threats and irregular activities.
  • Thoroughly document and escalate incidents, providing detailed history, status updates, and potential impacts.
  • Conduct cyber defense trend analysis and produce comprehensive reports.
  • Correlate events using diverse information sources to evaluate the effectiveness of observed attacks.
  • Create daily summaries of relevant network events in alignment with cybersecurity practices.
  • Investigate malicious activities to uncover exploited vulnerabilities and techniques.
  • Recommend enhancements to address identified security gaps.
  • Monitor external sources to remain updated on evolving cyber threats and vulnerabilities.
  • Collaborate with team members to develop and document procedures for SOC operations.

Required Skills

  • Extensive knowledge of SIEM/Security Suite, with a preference for Azure Sentinel experience.
  • Proficiency in SIEM ES configuration, tuning, and incident investigation.
  • Familiarity with log ingestion methods, including raw log ingestion, email, and API.
  • Ability to create and manage custom parsers within a 24⁄7 operational environment.
  • Strong written and verbal communication abilities, with comfort in presenting to technical teams.

Qualifications

  • A minimum of eight (8) years of experience in Security Incident Response, Security Operations Center, or threat analysis.
  • Demonstrated analytical experience with Splunk Enterprise Security is essential.
  • CompTIA Security+ certification or a higher credential is required.
  • Additional certifications such as Certified Ethical Hacker (CEH) and Certified Incident Handler (GCIH or ECIH) are advantageous.

Career Growth Opportunities

As a SOC Analyst, you will be presented with opportunities for professional development and skill enhancement through real-world experiences and mentorship within our esteemed team. We prioritize continuous learning and are committed to nurturing talent, facilitating a clear pathway for career advancement within our organization.

Company Culture And Values

Our organization prides itself on fostering a collaborative environment that values knowledge sharing and professional excellence. We are dedicated to creating a supportive culture that encourages diversity and continuous improvement, enabling our team members to thrive and make significant contributions to the cybersecurity field.

Join Us

If you are eager to contribute your expertise in the ever-evolving field of cybersecurity and work alongside a committed team, we invite you to apply. Your skills could play a pivotal role in enhancing our security operations and safeguarding our vital assets.

Employment Type: Full-Time

Required profile

Experience

Level of experience: Senior (5-10 years)
Industry :
Human Resources, Staffing & Recruiting
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Verbal Communication Skills
  • Collaboration
  • Incident Reporting

Security Analyst Related jobs