Job Title: SOC Analyst
Location: San Jose, CA (Onsite)
Duration: 12 months+ (24x7x365 support staff with Swing/Graveyard shifts and rotations into Day shift)
Rate: $73 to $76/hr (W2 Only)
Experience Required: Minimum 3 years in incident detection and response, malware analysis, or digital forensics
Keywords : Splunk, SQL, EDR, Threat Analytics, SIEM, Automation, Cybersecurity
Job Description
We are seeking a skilled SOC Analyst to join our team and play a critical role in maintaining and enhancing our organization's cybersecurity posture. This position focuses on cyber analysis, scripting, automation, and managing threats through advanced Security Information and Event Management (SIEM) systems.
Key Responsibilities
- Provide support for the Security Operations Center (SOC) with a focus on cyber analysis, automation, and scripting.
- Perform in-depth Splunk queries and SQL analysis for log data and analytics.
- Identify, mitigate, and respond to information security threats, defending critical assets from potential threats and hackers.
- Execute advanced analysis and trending of security log data across heterogeneous security devices.
- Utilize scripting or coding expertise in Unix Shell, Python, JavaScript , or other programming languages to enhance cybersecurity defenses.
- Work collaboratively to solve complex security problems and implement proactive threat mitigation strategies.
Required Skills and Expertise
- SIEM Systems : Hands-on experience with Splunk and other security information and event management tools.
- EDR (Endpoint Detection and Response) : Strong expertise in analyzing and responding to endpoint security alerts.
- Threat Analytics : Proficiency in identifying, assessing, and mitigating cybersecurity threats.
- Scripting and Coding : Practical knowledge of scripting in any language (Unix Shell, Python, JavaScript, etc.).
- SQL Queries : Ability to analyze data through SQL for reporting and threat detection purposes.
Key Focus Areas
- Splunk/SQL : Querying and analytics for log data analysis.
- EDR/Alerts : Managing endpoint detection and response tools for security alerts.
- Threat Analytics : Proactively identifying and addressing security risks.
- Automation : Developing scripts and tools to streamline SOC operations.
Additional Details
- Shifts: This role involves working Swing and/or Graveyard shifts with periodic rotations into Day shifts to ensure continuous coverage.
- Project Scope: Be part of a team defending against evolving cybersecurity threats while contributing to critical information security operations.