Skip to content
mimi

SOC Analyst Level 3-US

Zortech Solutions

Bridgewater · Hybrid Full-time Senior Today

About the role

Role

SOC Analyst Level 3

Location

Iselin NJ and Bridgewater NJ (2-3 days from Office)

Duration

Contract/Full Time

Must have

  • IBM QRadar and Splunk
  • IBM Resilient
  • Play books Creation
  • Security use case management

Required Expertise

  • The ideal candidate for a SOC L1 position should have a strong understanding of cybersecurity concepts and a basic understanding of various security technologies and SIEM tools including the Splunk and QRadar XDR tool.
  • Additionally, should possess excellent analytical and problem-solving skills, as well as strong written and verbal communication skills.
  • Ability to work effectively in a fast-paced and dynamic environment.

Key Responsibilities

  • A SOC (Security Operations Center) Level 3 with expertise in SIEM tools (like QRadar on Cloud (QROC), Splunk, Rapid7) is a crucial member of an organization's cybersecurity team, responsible for providing advanced technical support and incident response.
  • The main responsibilities of a SOC L3 Technician with QROC experience include:
    • Utilizing the QROC and Splunk tool to monitor the security environment for potential threats and incidents.
    • Analyzing and triaging security alerts generated by the QROC and Splunk tool, making informed decisions on the appropriate response.
    • Responding to security incidents, taking appropriate actions to contain, mitigate, and remediate security threats.
    • Collaborating with other members of the SOC team, as well as internal and external stakeholders, to resolve complex security incidents.
    • Keeping up to date with the latest cybersecurity threats, trends, and technologies to improve the efficiency and effectiveness of incident response.
    • Documenting security incidents, responses, and related information in accordance with established procedures.
  • Mentoring and training lower-level SOC technicians on the use of the QROC tool and incident response best practices.

Requirements

  • Strong understanding of cybersecurity concepts
  • Basic understanding of various security technologies and SIEM tools including the Splunk and QRadar XDR tool.
  • Excellent analytical and problem-solving skills
  • Strong written and verbal communication skills.
  • Ability to work effectively in a fast-paced and dynamic environment.

Responsibilities

  • Utilizing the QROC and Splunk tool to monitor the security environment for potential threats and incidents.
  • Analyzing and triaging security alerts generated by the QROC and Splunk tool, making informed decisions on the appropriate response.
  • Responding to security incidents, taking appropriate actions to contain, mitigate, and remediate security threats.
  • Collaborating with other members of the SOC team, as well as internal and external stakeholders, to resolve complex security incidents.
  • Keeping up to date with the latest cybersecurity threats, trends, and technologies to improve the efficiency and effectiveness of incident response.
  • Documenting security incidents, responses, and related information in accordance with established procedures.
  • Mentoring and training lower-level SOC technicians on the use of the QROC tool and incident response best practices.

Skills

IBM QRadarIBM ResilientPlaybooksRapid7Security use case managementSplunk

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free