Overview
On Site
$50 - $60
Contract - W2
Contract - Independent
Contract - 12 Month(s)
Skills
Amazon Web Services
ArcSight
CISM
CISSP
Certified Ethical Hacker
Cloud Security
Cyber Security
Firewall
GCFA
GCIA
GCIH
Good Clinical Practice
Google Cloud Platform
IBM QRadar
IOC
IPS
Linux
Log Analysis
LogRhythm
Malware Analysis
Management
Microsoft Azure
Microsoft Windows
Network Layer
Network Protocols
OSCP
SIEM
Splunk
System On A Chip
Workflow
IDS
Job Details
10+ years of experience in Cybersecurity, with minimum 5 years in a SOC L3 role.
Strong expertise in SIEM platforms (e.g., Splunk, QRadar, ArcSight, LogRhythm).
Hands-on experience with EDR tools (e.g., CrowdStrike, SentinelOne, Carbon Black).
Familiarity with MITRE ATT&CK framework, TTPs, and IOC management.
Strong understanding of network protocols, firewall and IDS/IPS concepts.
Experience in log analysis, packet capture (PCAP) analysis, and malware behavior.
Solid knowledge of Windows, Linux, and Cloud security (AWS, Azure, or Google Cloud Platform).
Experience with SOAR platforms and automation workflows.
Relevant certifications such as GCIA, GCFA, GCIH, CEH, OSCP, CISSP, or CISM.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.