Role: SOC L3 Analyst
Location: Iselin NJ (100% Day 1 Onsite)
Hire Type: Fulltime
Must have: SOC , SOAR , Splunk ,SIEM , Strong expertise in EDR tools such as CrowdStrike, or similar.
- Experience with SOAR platforms and developing automated workflows and playbooks
Overview:
As a SOC L3 Analyst, you will be responsible for leading the investigation and response to complex security incidents, engineering advanced detection content, and optimizing security tools and processes. With a strong focus on Splunk, content engineering, Endpoint Detection and Response (EDR), and Security Orchestration, Automation, and Response (SOAR), you will enhance the SOC's capabilities to detect and mitigate advanced cyber threats.
Qualifications:
· Bachelor’s degree in computer science, Information Security, or a related field, or equivalent experience.
· 8 to 11 years of experience in cybersecurity, with a focus on SOC operations, incident response, and security engineering.
· Proficiency with Splunk, including advanced search, dashboard creation, and content engineering.
· Strong expertise in EDR tools such as CrowdStrike, or similar.
· Experience with SOAR platforms and developing automated workflows and playbooks.
· Excellent analytical, problem-solving, and communication skills.
· Ability to work independently and as part of a team in a fast-paced environment.
Preferred Certifications:
- Certified Information Systems Security Professional (CISSP)
- GIAC Certified Incident Handler (GCIH)
- GIAC Certified Forensic Analyst (GCFA)
- Splunk Certified User/Power User/Architect
- Certified SOAR Analyst (CSA)