Job Description
About the job
SOC Analyst L2 & L3
Mississauga ,ON – Hybrid 2 days
Contract
Mandatory Skills
Ability to work with very large and complex network.
Self-motivated individual and creative thinker who will take ownership of tasks and projects, able to work with the team, and manages tasks effectively and has a proven track record of consist and organized outputs.
The ideal candidate will demonstrate an eagerness to understand complex problems and requirements, an aptitude for translating these problems into workable designs and solutions, and will possess a keen eye for detail.
Job Description for SOC Analyst. ( L2 and L3 )
• Ability to work with very large and complex network.
• Self-motivated individual and creative thinker who will take ownership of tasks and projects, able to work with the team, and manages tasks effectively and has a proven track record of consist and organized outputs.
• The ideal candidate will demonstrate an eagerness to understand complex problems and requirements, an aptitude for translating these problems into workable designs and solutions, and will possess a keen eye for detail.
Skills Required 4+ years’ for L2 and 8+ years for L3
Having knowledge / experience on any SIEM tool (preferably SPLUNK) and SOAR tools ( preferably TINES).
Exposure to Mitre framework and equivalent, Hands on experience in EDR platforms ( CROWDSTRIKE ) and threat analysis, threat hunting / incident response experience.
Experience in analysing security incidents and responding to them in methodical manner
Knowledge in Network security/ System Security/ Endpoint Security.
Experience of Event Monitoring and analysis and escalations. Provide inputs for content management.
Experience on Monthly, Weekly and daily reporting.
Willing to work on 24/7 operations.
Review SIEM escalated incidents and qualify true positives
Provide a monthly trend and security analysis summary report
Provide SIEM event/Incident analytics support
Provide log analysis summary and recommendations on detection/protection of incidents
Perform advanced triages and work in collaboration with resolved groups, third party or with designated customer contacts
Liaise between cross functional teams and assist in formulating security incident response report
Advocate protection and mitigation strategies to be implemented from lessons learnt exercises
Strong knowledge of Operating systems namely Windows, linux and MAC
Strong understanding of cyber security threats
Knowledge of recent cyber security trends
Experience in creating rules in SIEM
Understanding of usage of AI in cyber security
Soft skills
• Shall have good verbal/written communication skills
• Should be willing to work in 24×7 environments
• From time to time travel opportunities may be assigned
• Incumbent should carry continual system improvement mindset and able to demonstrate in work.
• Client facing technical analysis report and presentation skills
“We are an Equal Opportunity Employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.”
Set alert for similar jobs
