Job Description

  • Contractor
  • Anywhere

About the job
SOC Analyst L2 & L3

Mississauga ,ON – Hybrid 2 days

Contract

 

Mandatory Skills

Ability to work with very large and complex network.
Self-motivated individual and creative thinker who will take ownership of tasks and projects, able to work with the team, and manages tasks effectively and has a proven track record of consist and organized outputs.
The ideal candidate will demonstrate an eagerness to understand complex problems and requirements, an aptitude for translating these problems into workable designs and solutions, and will possess a keen eye for detail.
Job Description for SOC Analyst. ( L2 and L3 )

• Ability to work with very large and complex network.

• Self-motivated individual and creative thinker who will take ownership of tasks and projects, able to work with the team, and manages tasks effectively and has a proven track record of consist and organized outputs.

• The ideal candidate will demonstrate an eagerness to understand complex problems and requirements, an aptitude for translating these problems into workable designs and solutions, and will possess a keen eye for detail.

 

Skills Required 4+ years’ for L2 and 8+ years for L3

Having knowledge / experience on any SIEM tool (preferably SPLUNK) and SOAR tools ( preferably TINES).

Exposure to Mitre framework and equivalent, Hands on experience in EDR platforms ( CROWDSTRIKE ) and threat analysis, threat hunting / incident response experience.

Experience in analysing security incidents and responding to them in methodical manner

Knowledge in Network security/ System Security/ Endpoint Security.

Experience of Event Monitoring and analysis and escalations. Provide inputs for content management.

Experience on Monthly, Weekly and daily reporting.

Willing to work on 24/7 operations.

Review SIEM escalated incidents and qualify true positives

Provide a monthly trend and security analysis summary report

Provide SIEM event/Incident analytics support

Provide log analysis summary and recommendations on detection/protection of incidents

Perform advanced triages and work in collaboration with resolved groups, third party or with designated customer contacts

Liaise between cross functional teams and assist in formulating security incident response report

Advocate protection and mitigation strategies to be implemented from lessons learnt exercises

Strong knowledge of Operating systems namely Windows, linux and MAC

Strong understanding of cyber security threats

Knowledge of recent cyber security trends

Experience in creating rules in SIEM

Understanding of usage of AI in cyber security

 

Soft skills

• Shall have good verbal/written communication skills

• Should be willing to work in 24×7 environments

• From time to time travel opportunities may be assigned

• Incumbent should carry continual system improvement mindset and able to demonstrate in work.

• Client facing technical analysis report and presentation skills

 

“We are an Equal Opportunity Employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.”

Set alert for similar jobs