Role: Lead Security Analyst
Duration: Long Term
Location: New Jersey
Overview:
The SOC L3 Analyst leads complex incident investigations designs advanced detection content and optimizes security tools focusing on Splunk EDR and SOAR. They improve the SOCs threat detection and response capabilities.
Key Responsibilities:
- Lead highseverity incident responses perform root cause analysis and develop remediation strategies.
- Design advanced detection content in Splunk and improve threat detection continuously.
- Use EDR tools (e.g. CrowdStrike) for endpoint threat analysis and forensics.
- Create and maintain automated workflows on SOAR for streamlined responses.
- Conduct proactive threat hunting and develop methodologies.
- Collaborate across teams and mentor L1 and L2 analysts.
- Optimize security tools and document incident response details for management.
Qualifications:
- Bachelors degree or equivalent experience in cybersecurity.
- 8 years in SOC operations incident response and security engineering.
- Expertise in Splunk EDR tools and SOAR automation.
Preferred Certifications: CISSP GCIH GCFA Splunk Certified Certified SOAR Analyst