Dear *Professional*,


Hope you are doing great today...



This is *BABU, BDM FROM PANTAR SOLUTIONS INC*, we are an Information
Technology and Business Consulting firm specializing in Project-based
Solutions and Professional Staffing Services. Please have a look at below
position which is with our Client and let me know your interest ASAP. I
would really appreciate if you could send me your *MOST RECENT UPDATED
RESUME*:


*Role: SOC L3 Analyst *

*Location: Remote*

*Duration: Long Term Contract*

*Need strong **SOC L3 Analyst with Cybersecurity, Incident response,
Security engineering, Splunk, EDR tools (CrowdStrike or similar), SOAR
platforms Exp.*

*Consultant LinkedIn profile should be created before 2018*


*Need 8-11+ yrs of IT Exp. Profiles **|| Need Passport number, I94, Travel
History documents during submission for TN1/H1/GC EAD/GC*


*Job Description: SOC L3 Analyst (8 to 11 Years Experience) *


Overview: As a SOC L3 Analyst, you will be responsible for leading the
investigation and response to complex security incidents, engineering
advanced detection content, and optimizing security tools and processes.
With a strong focus on Splunk, content engineering, Endpoint Detection and
Response (EDR), and Security Orchestration, Automation, and Response
(SOAR), you will enhance the SOC's capabilities to detect and mitigate
advanced cyber threats.


*Key Responsibilities: *


1. Advanced Incident Response: - Lead the investigation and response to
high-severity security incidents, performing deep-dive analysis and root
cause determination. - Develop and execute remediation plans to contain and
eradicate threats.

2. Content Engineering: - Design and develop advanced detection rules,
alerts, and dashboards in Splunk to enhance threat detection capabilities.
- Continuously improve detection content based on emerging threats and
attack patterns.

3. Endpoint Detection and Response (EDR): - Utilize EDR tools (e.g.,
CrowdStrike, Carbon Black) to monitor, analyze, and respond to endpoint
threats. - Conduct advanced forensic analysis on compromised systems to
identify indicators of compromise (IOCs) and tactics, techniques, and
procedures (TTPs) used by threat actors.

4. Security Orchestration, Automation, and Response (SOAR): - Develop and
maintain automated workflows and playbooks on the SOAR platform to
streamline incident response processes. - Integrate SOAR with other
security tools and systems to automate threat detection, investigation, and
response tasks.

5. Threat Hunting: - Conduct proactive threat hunting activities to
identify hidden threats and security weaknesses within the environment. -
Develop and implement threat hunting methodologies and use cases.

6. Collaboration and Mentoring: - Collaborate with other SOC analysts,
threat intelligence teams, and IT departments to improve overall security
posture. - Provide mentorship and guidance to L1 and L2 analysts, sharing
knowledge and best practices.

7. Security Tool Optimization: - Optimize the configuration and performance
of security tools, including Splunk, EDR, and SOAR platforms. - Evaluate
and recommend new security technologies and solutions to enhance SOC
capabilities.

8. Documentation and Reporting: - Document incident response activities,
findings, and outcomes in detail. - Prepare comprehensive reports and
briefings for senior management and stakeholders on security incidents and
SOC performance.

9. Continuous Improvement: - Stay updated with the latest cybersecurity
threats, trends, and technologies. - Participate in training and
professional development activities to enhance skills and knowledge.


*Qualifications: *

- Bachelor's degree in computer science, Information Security, or a related
field, or equivalent experience.

- 8 to 11 years of experience in cybersecurity, with a focus on SOC
operations, incident response, and security engineering.

- Proficiency with Splunk, including advanced search, dashboard creation,
and content engineering.

- Strong expertise in EDR tools such as CrowdStrike, or similar.

- Experience with SOAR platforms and developing automated workflows and
playbooks.

- Excellent analytical, problem-solving, and communication skills.

 - Ability to work independently and as part of a team in a fast-paced
environment.


*Preferred Certifications: *

- Certified Information Systems Security Professional (CISSP)

- GIAC Certified Incident Handler (GCIH)

- GIAC Certified Forensic Analyst (GCFA)

- Splunk Certified User/Power User/Architect

- Certified SOAR Analyst (CSA)


*Working Conditions: *

- This role requires working in shifts to provide 24/7 security monitoring.




*PLEASE NOTE:*

If for any reason this does not interest you or you felt uncomfortable by
any part of this email, I sincerely apologize. Please consider this E-mail
as a request for referrals and feel free in forward this email to anyone
whom you might find a fit.



*Thanks & Regards,*

Babu
Pantar Solutions Inc
1908 Cox Rd, Weddington, NC  28104
Email: babu (dot) s (at) pantarsolutions (dot) com
<http://pantarsolutions.com>

-- 
You received this message because you are subscribed to the Google Groups 
"project managment" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/d/msgid/project-managment/CAHynwgqmNLa89nt2RpmZoOsvNSmh%2Bw96M9_enVWJW8Oo6dhH1g%40mail.gmail.com.

Reply via email to