Job description
SOC Analyst - L3
Our client is looking for candidates to support Security Operations at a customer site, working directly with client personnel and systems. Candidates will independently support the client's engineering, manage, and monitor Security Operations Center (SOC) systems.
A successful candidate will have excellent technical skills focused in the security operations space, impeccable soft skills, and be a well-organized, self-directed individual with familiarity working for a service-based information security organization.
Requirements
- Established experience in operating in a SOC environment, either through relevant experience or qualifications. is required
- Knowledge of operating and maintaining an SIEM
- Knowledge of cloud architectures, particularly AWS
- Provide expertise in a supporting capacity for incident response activities and digital forensics state preservation, including the capture and preservation of system logs, volatile memory captures, and hard drive (physical or virtual) image captures
- Experience with programming or scripting languages such as PowerShell, Python, and Bash
- Conduct host forensics, network, forensics, log analysis, and malware triage in support of hunt operations
- Interface with client contact(s) and staff in a constructive and professional manner
- Utilize common forensic and incident response tools
- Develop comprehensive and accurate reports and presentations for both technical and executive audiences