Overview
HybridHybrid working model 3 days on-site/2 days remote each week
$50 - $55
Contract - W2
Contract - 12 Month(s)
Skills
Splunk
Crowdstrike
Job Details
Please note - We need only W2 Candidates, Can't do C2C/1099
Role: Information Security Analyst
Contact: 12 months
Location: Chandler, AZ
Hybrid working model 3 days on-site/2 days remote each week
Key Responsibilities:
- Monitor and analyze security events using SIEM tools (e.g., Splunk).
- Investigate alerts and indicators of compromise from CrowdStrike and other EDR platforms.
- Perform triage, containment, and remediation of security incidents.
- Develop incident response playbooks and assist in root cause analysis.
- Correlate events across logs, network traffic, and host activity for threat hunting.
- Coordinate with cross-functional teams for escalated incident resolution.
- Generate actionable reports and dashboards to support risk mitigation and compliance.
- Participate in continuous improvement of detection rules, response workflows, and threat intelligence integration.
EEO:
Mindlance is an Equal Opportunity Employer and does not discriminate in employment based on Minority/Gender/Disability/Religion/LGBTQI/Age/Veterans.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.