100% Remote. This requirement is for a Level 1 and Level 2 SOC role.
Client :: Network product based.
Duration :: Longterm
Years of experience :: 10yrs +
The suitable candidate for this position Must have experience with the following tools and technologies:
- CrowdStrike (EDR, NDR, NGSIEM)
- WAF: Fastly and Cloudflare
- Cloud platforms: Google Google Cloud Platform, AWS, and Azure
- IAM: Google IAM, OneLogin, and Active Directory
- Incident Response and Threat Hunting
Additional Tools:
- Freshdesk for ticketing
- Jira for project tracking
We are seeking skilled and motivated Contract Security Analysts to join the Managed Network Detections and Response (MNDR) team. The successful candidate(s) will play a critical role in our 24/7 security operations, leveraging a suite of security tools including our core NDR platform, CrowdStrike (for EDR), and CrowdStrike SIEM to protect our environment. We are hiring for both Tier 1 (T1) and Tier 2 (T2) levels.
Key Responsibilities (Applicable to All)
Efficiently manage and document security cases within the Hive and Fresh Service ticketing system.
Contribute to the continuous improvement of security operations processes and technical skills.
Maintain open communication and collaboration with other security team members.
Role-Specific Responsibilities & Requirements
Tier 1 (T1) Security Analyst
The Tier 1 Analyst serves as the first line of defense. Their core focus is the efficient handling of security alerts and initial investigations.
Alert Triaging & Case Management: Responsible for the efficient handling of Hive Cases, performing initial investigations, and accurately documenting findings.
Operational Adaptability: Must be adaptable and capable of assisting with other security operations tasks beyond core case management.
Escalation & Review: The T1 Analyst must escalate issues to a senior analyst when facing difficulties in determining case outcomes, handling complex customer requests, or requiring expert guidance. Crucially, all cases classified as High or Critical must undergo review by a T2 or T3 analyst before final submission and customer escalation. Furthermore, all tuning adjustments made by a T1 Analyst must be reviewed and approved by a T2 or T3 analyst before case closure.
Tier 2 (T2) Security Analyst
The Tier 2 Analyst serves as a critical bridge, providing expert assistance and proactive threat hunting capabilities.
In-Depth Investigation & Threat Hunting: Conduct in-depth investigations and proactive threat hunting within the NDR platform, CrowdStrike, and CrowdStrike SIEM to identify threats within the Our environment.
Tier 1 Support & Oversight: Support T1 analysts with complex cases, provide mentorship, and are responsible for reviewing and approving all High and Critical cases and all tuning adjustments reported by T1 analysts.
Case Load & Prioritization: Closely monitor case queues, prioritizing Our-related cases for timely resolution. They must maintain situational awareness of the overall case load and be prepared to surge resources as needed.
Customer Onboarding: Expected to possess a deep understanding of the NDR platform and team processes to effectively facilitate customer onboardings.
Qualifications (General)
Relevant certification (e.g., CompTIA Security+, CEH, GIAC certifications) is a plus.
Demonstrated experience in a Security Operations Center (SOC) environment.
Ability to work effectively in a dynamic and fast-paced environment.