Experienced L2 Security Operations Center Analyst for 3rd Shift Remote Position - 12 Months Contract Opportunity in Advanced Threat Detection and Incident Response

🌍 Remote, USA πŸš€ Full-time πŸ• Posted Recently

Job Description

Introduction to Workwarp and the Role Workwarp, a leading innovator in cybersecurity solutions, is seeking an experienced and skilled L2 Security Operations Center (SOC) Analyst to join our team on a 12-month contract basis. As a remote position, you will have the flexibility to work from the comfort of your own home, with a schedule that includes 10-hour shifts, four days a week, from Thursday to Sunday, covering our 3rd shift operations. This is an exceptional opportunity for a talented cybersecurity professional to contribute to the protection and security of our clients' networks and systems, working in a dynamic and fast-paced environment that values innovation, collaboration, and excellence. Position Overview In this critical role, you will be responsible for conducting advanced technical investigations into critical incidents, providing swift remediation advice, and enhancing customer security postures. Your expertise in analyzing infected hosts, network traffic, and complex log analysis will be crucial in identifying attacker activity and handling forensic and malware analysis requests. As a key member of our Security Monitoring team, you will utilize your in-depth technical knowledge to design procedures for detecting threat actors' behavior, develop standard technical procedures (runbooks), and perform event stream tuning for systems efficiency. Key Responsibilities Conduct advanced technical investigations for critical incidents, focusing on specific analysis and fast remediation advice to improve customer security postures. Analyze infected hosts or network traffic to identify attacker activity and handle specific forensic and malware analysis requests. Perform event correlation reviews through incoming data feeds, ticketing systems, and security alert mechanisms. Provide context on complex security incidents from customer and other available resources, collect and assemble data, and contribute to technical reports. Utilize in-depth technical knowledge to design procedures for the detection of threat actors' behavior and develop standard technical procedures (runbooks) for the Security Monitoring team. Perform event stream tuning utilizing internal tools, metrics, and experience involving key security concepts for systems efficiency. Review security-related events, assess their risk and validity based on available network, endpoint, and global threat intelligence information. Research and make recommendations for applying MITRE Telecommunication&CK and NIST framework-aligned strategies to the customer's environment. Essential Qualifications To be successful in this role, you will need to possess a combination of technical skills, knowledge, and experience in cybersecurity, including: A strong foundation in computer systems, networks, and cybersecurity principles. Experience working in a Security Operations Center (SOC) or similar environment, with a focus on threat detection and incident response. Advanced technical skills in areas such as malware analysis, forensic analysis, and log analysis. Proficiency in utilizing security tools and technologies, including SIEM systems, threat intelligence platforms, and security orchestration tools. Excellent analytical and problem-solving skills, with the ability to think critically and outside the box. Strong communication and collaboration skills, with the ability to work effectively in a remote team environment. Preferred Qualifications While not essential, the following qualifications and experience will be highly regarded: Relevant industry certifications, such as CompTIA Security+, CISSP, or CEH. Experience working with cloud-based security solutions and technologies. Knowledge of MITRE Telecommunication&CK and NIST frameworks, as well as other industry standards and best practices. Programming skills in languages such as Python, PowerShell, or C++. Experience with automation tools and scripting, such as Ansible or SaltStack. Skills and Competencies To excel in this role, you will need to demonstrate the following skills and competencies: Technical expertise: A deep understanding of cybersecurity principles, threat detection, and incident response. Analytical skills: The ability to analyze complex data sets, identify patterns, and draw meaningful conclusions. Problem-solving skills: The ability to think critically and creatively, with a focus on resolving complex technical problems. Communication skills: The ability to communicate technical information effectively to both technical and non-technical stakeholders. Collaboration skills: The ability to work effectively in a remote team environment, with a focus on collaboration and knowledge sharing. Career Growth Opportunities and Learning Benefits At Workwarp, we are committed to the growth and development of our employees. As an L2 SOC Analyst, you will have access to a range of training and development opportunities, including: On-the-job training and mentorship from experienced cybersecurity profes

Apply tot his job

Apply To this Job

Ready to Apply?

Don't miss out on this amazing opportunity!

πŸš€ Apply Now

Similar Jobs

Recent Jobs

You May Also Like