Act as an escalation point for high and critical severity security incidents and conduct thorough investigations
Analyze attack patterns and provide recommendations on issue resolution activities
Conduct threat hunting and gather evidence to validate root cause and analyze the extent of compromise
Required Qualifications
Minimum 3+ years of experience as a SOC L3 Analyst in a Global SOC team
Experience with SIEM vendors such as QRadar, Sentinel, or Splunk
Experience in incident response and writing procedures, runbooks, and playbooks
Ability to work collaboratively with customer's IT and security teams
Average salary estimate
$0
/ YEARLY (est.)
min
max
$0K
$0K
If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.