L3 Security Operations Specialist

Overview

Remote
60 - 75
Accepts corp to corp applications
Contract - W2
Contract - Independent
Contract - 12 Month(s)
No Travel Required
Unable to Provide Sponsorship

Skills

L3 Security Operations Specialist
ReliaQuest GreyMatter’s
4+ years SOC experience (L2/L3 level)
CrowdStrike Falcon

Job Details

Requirement:

 

 

Job Title: L3 Security Operations Specialist

Remote

12+ Months

 

 

Role Overview:

 

The L3 Analyst will provide expert-level triage, incident validation, threat analysis, and decision-making for alerts escalated through ReliaQuest GreyMatter’s Agentic AI–driven SOC platform. This role complements RQ’s automated L1/L2 capabilities by performing deep-dive investigations, business-contextual analysis, and continuous improvement of detection rules, playbooks, and automation.

 

The analyst must be proficient with CrowdStrike Falcon, Google SecOps/SIEM, and cloud infrastructure security, with strong analytical and communication skills.

 

Key Responsibilities: 

 

Incident Analysis & Response

  • Perform L3 validation of alerts escalated by RQ GreyMatter AI.
  • Conduct deep-dive investigations on true positives, anomalous safe events, and "no response" alerts.
  • Correlate data across CrowdStrike, Google SecOps, IAM logs, network telemetry, and cloud environments.
  • Recommend tactical and strategic response actions.

Automation & Tuning:

  • Identify false positives and propose detection logic improvements.
  • Work with Halliburton + RQ teams to develop high-fidelity detection rules.
  • Enhance automated playbooks based on observed patterns.
  • Contribute to adversary simulations and attack path mapping.

Threat Intelligence & Hunting

  • Perform proactive hunting using CrowdStrike/Google SecOps datasets.
  • Identify emerging threats relevant to oil & gas / energy sector.
  • Conduct behavior-based analysis beyond signature indicators.

Governance, Reporting & Stakeholder Engagement

  • Prepare daily/weekly operational summaries.
  • Provide recommendations for reducing risk exposure.
  • Participate in knowledge transfer and tuning workshops with Halliburton & RQ teams.
  • Maintain documentation of incidents, playbooks, and detection updates.

 

Required Skills: 

  • 4+ years SOC experience (L2/L3 level)
  • Strong hands-on experience in:
  • CrowdStrike Falcon (Detection, Response, RTR, Threat Hunting),
  • Google SecOps / Chronicle / Google SIEM
  • Security automation frameworks
  • MITRE ATT&CK mapping
  • Cloud platforms (AWS/Azure/Google Cloud Platform)
  • Experience with threat detection, malware behaviour, and IR methodology

 

Analytical Skills:

  • Strong critical thinking
  • Ability to validate AI-driven decisions
  • Ability to identify tuning opportunities
  • Strong pattern-recognition skills in threat behaviours
  • Soft Skills
  • Excellent communication skills
  • Ability to work independently during shifts
  • Cross-functional collaboration with customer & RQ teams
  • Ownership mentality and continuous improvement mindset

 

Preferred Certifications: 

  • CrowdStrike CCFR / CCSA / CCP
  • Google Cybersecurity Professional / SecOps Certifications
  • GCIA, GCED, GCIH, or equivalent
  • Azure/AWS/Google Cloud Platform security certifications
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.