Overview
On Site
$50 - $55
Contract - W2
Contract - Independent
Contract - 12 Month(s)
Skills
Analytical Skill
GCFA
GCIH
ISO/IEC 27001:2005
Digital Forensics
Cyber Security
Certified Ethical Hacker
Palo Alto
Splunk
SIEM
System On A Chip
Job Details
Job Title: L2 SOC analyst
Location: St Peters, FL, Boston, MA, NYC, NY
Duration: Long Term Contract
Hybrid- 3 days in office
Job Description
Required Qualifications
Experience:Min8 years in cybersecurity, with a focus on SOC operations and incident response.
Environment:Experience in a 24x7 operational environment, preferably across multiple geographies.
Technical Skills:
Good understanding of networking protocols, operating systems (Windows/Linux), and security technologies.
Exposure to malware analysis and digital forensics.
Familiarity with cybersecurity frameworks (e.g., NIST, MITRE ATT&CK, ISO 27001).
Hands-on experience with tools such as:
SIEM:Splunk, CrowdStrike, QRadar
EDR:CrowdStrike, Carbon Black, SentinelOne
SOAR:Palo Alto XSOAR, Splunk SOAR
Forensics:FTK Imager, Autopsy, Wireshark, Procmon
Preferred Certifications:
GIAC Certified Incident Handler (GCIH)
GIAC Certified Forensic Analyst (GCFA)
Certified Ethical Hacker (CEH)
Soft Skills & Attributes:
Strong analytical and problem-solving mindset.
Excellent communication and collaboration skills.
Ability to work under pressure and manage multiple priorities.
High integrity and a proactive, team-oriented attitude.
Strategic and tactical thinking with attention to detail.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.