SOC L3 Analyst
Ampcus Incorporated
2024-11-08 14:41:26
Iselin, New Jersey, United States
Job type: fulltime
Job industry: Administration
Job description
Bravens Inc., a wholly owned subsidiary of Ampcus Inc., is an information technology consulting and services company. Bravens is a leader in providing tailored staffing solutions across both IT and non-IT industries. We are in search of a highly motivated candidate to join our talented team and contribute to our ongoing success
Position : SOC L3 Analyst
Location : Iselin, NJ
Must have :
SOC , SOAR , Splunk ,SIEM , Strong expertise in EDR tools such as CrowdStrike, or similar.
Experience with SOAR platforms and developing automated workflows and playbooks
Overview:
As a SOC L3 Analyst, you will be responsible for leading the investigation and response to complex security incidents, engineering advanced detection content, and optimizing security tools and processes. With a strong focus on Splunk, content engineering, Endpoint Detection and Response (EDR), and Security Orchestration, Automation, and Response (SOAR), you will enhance the SOC's capabilities to detect and mitigate advanced cyber threats.
Qualifications:
- Bachelor's degree in computer science, Information Security, or a related field, or equivalent experience.
- 8 to 11 years of experience in cybersecurity, with a focus on SOC operations, incident response, and security engineering.
- Proficiency with Splunk, including advanced search, dashboard creation, and content engineering.
- Strong expertise in EDR tools such as CrowdStrike, or similar.
- Experience with SOAR platforms and developing automated workflows and playbooks.
- Excellent analytical, problem-solving, and communication skills.
- Ability to work independently and as part of a team in a fast-paced environment.
Preferred Certifications:
- Certified Information Systems Security Professional (CISSP)
- GIAC Certified Incident Handler (GCIH)
- GIAC Certified Forensic Analyst (GCFA)
- Splunk Certified User/Power User/Architect
- Certified SOAR Analyst (CSA)
Working Conditions:
- This role requires working in shifts to provide 24/7 security monitoring
Key Responsibilities:
1. Advanced Incident Response:
- Lead the investigation and response to high-severity security incidents, performing deep-dive analysis and root cause determination.
- Develop and execute remediation plans to contain and eradicate threats.
2. Content Engineering:
- Design and develop advanced detection rules, alerts, and dashboards in Splunk to enhance threat detection capabilities.
- Continuously improve detection content based on emerging threats and attack patterns.
3. Endpoint Detection and Response (EDR):
- Utilize EDR tools (e.g., CrowdStrike, Carbon Black) to monitor, analyze, and respond to endpoint threats.
- Conduct advanced forensic analysis on compromised systems to identify indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) used by threat actors.
4. Security Orchestration, Automation, and Response (SOAR):
- Develop and maintain automated workflows and playbooks on the SOAR platform to streamline incident response processes.
- Integrate SOAR with other security tools and systems to automate threat detection, investigation, and response tasks.
5. Threat Hunting:
- Conduct proactive threat hunting activities to identify hidden threats and security weaknesses within the environment.
- Develop and implement threat hunting methodologies and use cases.
6. Collaboration and Mentoring:
- Collaborate with other SOC analysts, threat intelligence teams, and IT departments to improve overall security posture.
- Provide mentorship and guidance to L1 and L2 analysts, sharing knowledge and best practices.
7. Security Tool Optimization:
- Optimize the configuration and performance of security tools, including Splunk, EDR, and SOAR platforms.
- Evaluate and recommend new security technologies and solutions to enhance SOC capabilities.
8. Documentation and Reporting:
- Document incident response activities, findings, and outcomes in detail.
- Prepare comprehensive reports and briefings for senior management and stakeholders on security incidents and SOC performance.
9. Continuous Improvement:
- Stay updated with the latest cybersecurity threats, trends, and technologies.
- Participate in training and professional development activities to enhance skills and knowledge.
Bravens is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identify, national origin, age, protected veterans or individuals with disabilities.