Contract Security Analyst (Level 1 and Level 2 SOC)

Jobs via Dice • United State
Remote
Apply
AI Summary

We are seeking skilled Contract Security Analysts to join the Managed Network Detections and Response (MNDR) team. The successful candidate will play a critical role in our 24/7 security operations, leveraging a suite of security tools to protect our environment. The role involves efficient case management, incident response, and threat hunting.

Key Highlights
100% Remote
Long-term contract
10+ years of experience required
Key Responsibilities
Efficiently manage and document security cases within the Hive and Fresh Service ticketing system.
Contribute to the continuous improvement of security operations processes and technical skills.
Maintain open communication and collaboration with other security team members.
Alert Triaging & Case Management: Responsible for the efficient handling of Hive Cases, performing initial investigations, and accurately documenting findings.
In-Depth Investigation & Threat Hunting: Conduct in-depth investigations and proactive threat hunting within the NDR platform, CrowdStrike, and CrowdStrike SIEM to identify threats within the environment.
Technical Skills Required
CrowdStrike (EDR, NDR, NGSIEM) WAF: Fastly and Cloudflare Cloud platforms: Google Cloud Platform, AWS, and Azure IAM: Google IAM, OneLogin, and Active Directory Freshdesk for ticketing Jira for project tracking
Benefits & Perks
100% Remote
Long-term contract
Nice to Have
Relevant certification (e.g., CompTIA Security+, CEH, GIAC certifications)

Job Description


Dice is the leading career destination for tech experts at every stage of their careers. Our client, VentureSoft Global, is seeking the following. Apply via Dice today!

100% Remote. This requirement is for a Level 1 and Level 2 SOC role.

Client :: Network product based.

Duration :: Longterm

Years of experience :: 10yrs +

The suitable candidate for this position Must have experience with the following tools and technologies:

  • CrowdStrike (EDR, NDR, NGSIEM)
  • WAF: Fastly and Cloudflare
  • Cloud platforms: Google Google Cloud Platform, AWS, and Azure
  • IAM: Google IAM, OneLogin, and Active Directory
  • Incident Response and Threat Hunting

Additional Tools:

  • Freshdesk for ticketing
  • Jira for project tracking

We are seeking skilled and motivated Contract Security Analysts to join the Managed Network Detections and Response (MNDR) team. The successful candidate(s) will play a critical role in our 24/7 security operations, leveraging a suite of security tools including our core NDR platform, CrowdStrike (for EDR), and CrowdStrike SIEM to protect our environment. We are hiring for both Tier 1 (T1) and Tier 2 (T2) levels.

Key Responsibilities (Applicable To All)

Efficiently manage and document security cases within the Hive and Fresh Service ticketing system.

Contribute to the continuous improvement of security operations processes and technical skills.

Maintain open communication and collaboration with other security team members.

Role-Specific Responsibilities & Requirements

Tier 1 (T1) Security Analyst

The Tier 1 Analyst serves as the first line of defense. Their core focus is the efficient handling of security alerts and initial investigations.

Alert Triaging & Case Management: Responsible for the efficient handling of Hive Cases, performing initial investigations, and accurately documenting findings.

Operational Adaptability: Must be adaptable and capable of assisting with other security operations tasks beyond core case management.

Escalation & Review: The T1 Analyst must escalate issues to a senior analyst when facing difficulties in determining case outcomes, handling complex customer requests, or requiring expert guidance. Crucially, all cases classified as High or Critical must undergo review by a T2 or T3 analyst before final submission and customer escalation. Furthermore, all tuning adjustments made by a T1 Analyst must be reviewed and approved by a T2 or T3 analyst before case closure.

Tier 2 (T2) Security Analyst

The Tier 2 Analyst serves as a critical bridge, providing expert assistance and proactive threat hunting capabilities.

In-Depth Investigation & Threat Hunting: Conduct in-depth investigations and proactive threat hunting within the NDR platform, CrowdStrike, and CrowdStrike SIEM to identify threats within the Our environment.

Tier 1 Support & Oversight: Support T1 analysts with complex cases, provide mentorship, and are responsible for reviewing and approving all High and Critical cases and all tuning adjustments reported by T1 analysts.

Case Load & Prioritization: Closely monitor case queues, prioritizing Our-related cases for timely resolution. They must maintain situational awareness of the overall case load and be prepared to surge resources as needed.

Customer Onboarding: Expected to possess a deep understanding of the NDR platform and team processes to effectively facilitate customer onboardings.

Qualifications (General)

Relevant certification (e.g., CompTIA Security+, CEH, GIAC certifications) is a plus.

Demonstrated experience in a Security Operations Center (SOC) environment.

Ability to work effectively in a dynamic and fast-paced environment.

Similar Jobs

Explore other opportunities that match your interests

Head of People Programs & Operations

Programming
•
1h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Executive

Jobgether

United State

Director of Compliance

Programming
•
1h ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

sierra club

United State

Front-End Developer

Programming
•
1h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

Bright Vision Technologies

United State

Subscribe our newsletter

New Things Will Always Update Regularly