SOC Analyst (Splunk & Crowdstrike)

  • Chandler, AZ
  • Posted 1 day ago | Updated 1 day ago

Overview

Hybrid
$50 - $55
Contract - W2
Contract - 12 Month(s)

Skills

Splunk
Crowdstrike

Job Details

Please note - We need only W2 Candidates, Can't do C2C/1099

Role: Information Security Analyst

Contact: 12 months

Location: Chandler, AZ

Hybrid working model 3 days on-site/2 days remote each week

Key Responsibilities:

  • Monitor and analyze security events using SIEM tools (e.g., Splunk).
  • Investigate alerts and indicators of compromise from CrowdStrike and other EDR platforms.
  • Perform triage, containment, and remediation of security incidents.
  • Develop incident response playbooks and assist in root cause analysis.
  • Correlate events across logs, network traffic, and host activity for threat hunting.
  • Coordinate with cross-functional teams for escalated incident resolution.
  • Generate actionable reports and dashboards to support risk mitigation and compliance.
  • Participate in continuous improvement of detection rules, response workflows, and threat intelligence integration.

EEO:

Mindlance is an Equal Opportunity Employer and does not discriminate in employment based on Minority/Gender/Disability/Religion/LGBTQI/Age/Veterans.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.