SOC Level 2

Overview

Hybrid
$40 - $60
Contract - Independent
Contract - W2
Contract - 03 Year(s)
100% Travel

Skills

soc
splunk
SIEM
SOAR

Job Details

Job Description
·
SOC L2:

· min 5 yrs experience in SOC;
· must know Splunk;
· must report to our West Lake office (Hybrid);
· 24x7x365 role;
· must legally be eligible to work within US;
· must communicate with the customer directly;
· 3 professional references for the past experience.


L2 SOC Analyst will serve as a technical escalation resource for L1 SOC Analysts and provide mentoring for skill development. L2 SOC analyst perform threat analysis and investigations, provide remediation recommendations and support client response actions.
Shall perform the tasks below at a minimum:

· 24x7x365 Security event monitoring
· Incident analysis and investigation
· Threat Intel Correlation
· Provide containment and recovery guidance
· Support Client response actions
· Update SOPs or Playbooks
· Support Onsite breach investigations
· Support digital forensics
· Defining logic for SOAR playbooks
· Reporting
· Maintain Threat Intelligence feeds within SIEM
· Shall possess a minimum of five (5) years of experience in working in a Managed SOC.
· Shall possess a strong technical expertise in threat analysis.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.