Ref: #65340

L3 SOC Analyst

L3 SOC ANALYST POSITION
Overview:
My client (one of the largest MSSP’s in Europe) is looking for an experienced Level 3 SOC Analyst with a deep understanding of cybersecurity, specializing in CrowdStrike and Microsoft Sentinel technologies. This role focuses on proactive threat hunting, advanced incident detection, and response to ensure the security and resilience of our organization. The ideal candidate will leverage their expertise to identify and neutralize potential threats before they materialize while mentoring junior analysts and contributing to overall SOC maturity.

Key Responsibilities:

Threat Hunting:
  • Design and execute advanced threat-hunting campaigns leveraging CrowdStrike and Microsoft Sentinel.
  • Proactively search for indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) across the environment.
  • Identify anomalous activity using advanced threat intelligence, behavioral analytics, and security data.

Incident Response:
  • Lead investigations into complex security incidents and provide root cause analysis.
  • Create detailed incident reports and recommendations for remediation and future prevention.
  • Respond to and contain threats using CrowdStrike Falcon and Microsoft Sentinel tools.

SIEM and EDR Management:
  • Configure and fine-tune detection rules in Microsoft Sentinel to improve alert fidelity.
  • Optimize the use of CrowdStrike Falcon’s capabilities for endpoint detection and response (EDR).
  • Develop and implement use cases, analytics, and dashboards to enhance visibility and security posture.

Threat Intelligence Integration:
  • Integrate threat intelligence feeds into SOC workflows and tools.
  • Monitor and analyze trends in the threat landscape to identify potential risks.L3 SOC ANALYST POSITION
    Overview:
    My client (one of the largest MSSP’s in Europe) is looking for an experienced Level 3 SOC Analyst with a deep understanding of cybersecurity, specializing in CrowdStrike and Microsoft Sentinel technologies. This role focuses on proactive threat hunting, advanced incident detection, and response to ensure the security and resilience of our organization. The ideal candidate will leverage their expertise to identify and neutralize potential threats before they materialize while mentoring junior analysts and contributing to overall SOC maturity.

    Key Responsibilities:

    Threat Hunting:
  • Design and execute advanced threat-hunting campaigns leveraging CrowdStrike and Microsoft Sentinel.
  • Proactively search for indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) across the environment.
  • Identify anomalous activity using advanced threat intelligence, behavioral analytics, and security data.

  • Incident Response:
  • Lead investigations into complex security incidents and provide root cause analysis.
  • Create detailed incident reports and recommendations for remediation and future prevention.
  • Respond to and contain threats using CrowdStrike Falcon and Microsoft Sentinel tools.

  • SIEM and EDR Management:
  • Configure and fine-tune detection rules in Microsoft Sentinel to improve alert fidelity.
  • Optimize the use of CrowdStrike Falcon’s capabilities for endpoint detection and response (EDR).
  • Develop and implement use cases, analytics, and dashboards to enhance visibility and security posture.

  • Threat Intelligence Integration:
  • Integrate threat intelligence feeds into SOC workflows and tools.
  • Monitor and analyze trends in the threat landscape to identify potential risks.
Attach a resume file. Accepted file types are DOC, DOCX, PDF, HTML, and TXT.

We are uploading your application. It may take a few moments to read your resume. Please wait!