Location: Remote
Duration:12 Months
…
10 hr shift 4 day week
3rd shift. AND…. Thursday-Sunday
L2 SOC Analyst
• Conduct advanced technical investigations for critical incidents paying attention to specific analysis and fast
• remediation advice with a focus on improving the customer security posture
• Conduct analysis of infected hosts or analyze network traffic to identify attacker activity
• Handle specific forensic and malware analysis, as well as complex log analysis requests
• Perform event correlation review through incoming data feeds, ticketing systems and security alert
• mechanisms
• Provide context on complex security incidents from Customer and other available resources, collect and
• assemble data, as well as contribute to technical reports
• Utilize in-depth technical knowledge to design procedures for the detection of threat actor’s behavior, as well
• as develop and implement standard technical procedures (runbooks) to be used by the Security Monitoring
• team for day to day operations
• Perform Event Stream tuning utilizing internal tools, metrics and experience involving key security concepts
• for systems efficiency
• Review security related events assess their risk and validity based on available network, endpoint and global
• threat intelligence information
• Research and make recommendations for applying MITRE Telecommunication&CK and NIST framework aligned strategies
• to the Customer’s environment