SOC Detection Engineer - SOC Threat Analyst - HYBRID - 3 Days Office

Overview

Hybrid
$40 - $60
Contract - W2
Contract - Independent
Contract - 03 Year(s)
100% Travel

Skills

Threat
SOC
Splunk

Job Details

Job Description
SOC Threat Analyst:

min 3 yrs experience in SOC; at least 1 yr experience in Splunk;
blend of Threat Analyst & SOC Analyst experience is an advantage;
must report to our West Lake office (Hybrid);
must legally be eligible to work within US;
must communicate with the customer directly;
3 professional references for the past experience.

As a threat analyst, the analyst is focused on gathering, analyzing and interpreting Threat Intelligence data to identify potential risks and develop strategies to mitigate these risks.
Shall perform the tasks below at a minimum:

Monitor and analyze emerging cyber threats
Collect and assess data to identify potential risks to infrastructure, systems and data
Develop and maintain threat profiles, indicators of compromise and patterns of malicious activities to enhance detection and response capabilities
Participate in Incident Response Activities
Reporting

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.