100% Remote - Level 3 SOC Analyst (3rd Shift)

Posted 2025-10-26
Remote, USA Full Time Immediate Start
About the position Responsibilities • Monitor and respond to security events in a Splunk Security Information and Event Management (SIEM) environment. • Investigate and respond to proxy logs, suspicious emails, network traffic, and other potential security threats. • Conduct thorough investigations of incidents including phishing attempts, unauthorized software, suspicious processes, and policy violations. • Collaborate with a team of analysts to ensure effective response and mitigation of security incidents. • Play a key role in maturing SOC operations, including detection capabilities, Standard Operating Procedures (SOPs), and alerting structures. • Identify and implement process improvement opportunities to enhance overall security posture. • Assist in training and mentoring junior analysts, sharing knowledge and best practices. Requirements • 4+ years of experience working in a Security Operations Center (SOC). • 2+ years of experience in Cyber Incident Response Team (CIRT) operations. • Hands-on experience with Splunk, including navigating events and actioning requests. • Proficiency in responding to proxy logs and investigating suspicious emails. • Strong analytical and problem-solving skills with attention to detail. Nice-to-haves • Relevant security certifications such as Security+ (SEC+). • Experience in Blue Team hacking and proactive defense strategies. Apply tot his job Apply To this Job
Back to Job Board