Cyber Security Analyst L3
Job Location:- Remote
Long Term
Experience Required:- 8 + Years
Responsibilities:
Lead investigations into high-complexity security incidents, such as targeted attacks, APTs, or insider threats.
Analyse attacker Tactics, Techniques, and Procedures (TTPs) to understand attack vectors and methods.
Correlate diverse data sources (SIEM, endpoint, cloud, and network) to identify and contain sophisticated threats.
Design and execute proactive threat hunting campaigns using SIEM and threat intelligence data.
Identify potential weaknesses in the environment and suggest mitigations.
Leverage advanced tools and techniques to detect zero-day and novel threats.
Take ownership of critical incidents, coordinating with internal teams and external stakeholders.
Conduct post-incident analysis to identify gaps and recommend improvements to security controls.
Provide detailed reports on incidents, including root cause analysis and mitigation strategies.
Act as the technical escalation point for L2 analysts, assisting with complex investigations.
Collaborate with threat intelligence, vulnerability management, and IT teams to enhance security posture.
Provide mentorship and training to L1 and L2 analysts to improve team capabilities.
Participate in purple team exercises to improve detection and response strategies.
Refine and improve incident response playbooks and standard operating procedures (SOPs).
Define strategies for improving SOC maturity and aligning with frameworks like MITRE ATT&CK.
Ensure SOC activities adhere to regulatory requirements and industry best practices.
Provide executive-level reporting on security posture, incidents, and trends.
Lead tabletop exercises and simulations for executive and IT teams.
Develop and implement metrics to measure the effectiveness of detection and response efforts.
Mandatory Skill Set:-
8+ years of experience in cybersecurity, with significant focus on security operations and incident response.
Expertise in SIEM tools, advanced threat detection, and cybersecurity frameworks.
Strong analytical skills to handle complex security incidents and investigations.
Excellent leadership, communication, and collaboration skills.
Experience with advanced threat hunting, malware analysis, and digital forensics.
Familiarity with frameworks like MITRE ATT&CK, NIST, and regulatory compliance standards.
Certifications such as CISSP, CISM, GIAC, or equivalent are highly desirable.
Experience in leading purple team exercises and improving SOC maturity.
Finance and Insurance (F & I) ManagerShottenkirk Honda of DavisShottenkirk Automotive Group is family-owned and has been in business for over 60 years. We currently operate 27 Automotive Dealerships in 6 states and employ over 2,500 people. We believe culture makes...
We are looking for a skilled Butcher to provide high-quality meats and services to our customers. The Butcher will perform quality inspections, use meat grinders, knives, saws, and other tools to cut meat down into smaller portions, weigh, price, and package cuts, and ...
...CDL-A TRUCK DRIVER - $200 Per Day! Must have at least 6 months safe driving e. Home daily. Day and night shift. Excellent safety record required. No unloading-this is yard hosting. Home daily and will get set schedule once established. Weekend work...
We are a growing network of urgent care clinics. Our rapid growth is a result of our unmatched customer service and genuine compassion towards... ...organization who places a premium on our culture. Our Nurse Practitioners and Physician Assistants provide care for patients...
...Tailor: NYC, Hoboken, NJ & Greenwich, CT alts | Alteration Specialists is looking for Tailors We are looking for a dynamic professional Tailors, distinguished by their charisma, technical prowess, and professional integrity. This role will include, sewing on the...