SOC Analyst

Overview

Hybrid
$70+
Contract - Independent
Contract - W2
Contract - 12 Month(s)

Skills

Splunk
CrowdStrike
QRadar
Carbon Black
SentinelOne
Palo Alto XSOAR
Splunk SOAR
SOC
cybersecurity frameworks
Cybersecurity
palo alto

Job Details

Job Requisition Details:

Experience:Min8 years in cybersecurity, with a focus on SOC operations and incident response.

Environment:Experience in a 24x7 operational environment, preferably across multiple geographies.

Technical Skills: Good understanding of networking protocols, operating systems (Windows/Linux), and security technologies.

Exposure to malware analysis and digital forensics.

Familiarity with cybersecurity frameworks (e.g., NIST, MITRE ATT&CK, ISO 27001).

Hands-on experience with tools such as:

SIEM:Splunk, CrowdStrike, QRadar

EDR:CrowdStrike, Carbon Black, SentinelOne

SOAR:Palo Alto XSOAR, Splunk SOAR

Forensics:FTK Imager, Autopsy, Wireshark, Procmon

Preferred Certifications: GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) Certified Ethical Hacker (CEH)

Soft Skills & Attributes: Strong analytical and problem-solving mindset.

Excellent communication and collaboration skills.

Ability to work under pressure and manage multiple priorities.

High integrity and a proactive, team-oriented attitude.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About Microgreen Technologies LLC