Aktiviere Job-Benachrichtigungen per E-Mail!

L3 SOC Analyst

Next Ventures

Lausanne

Vor Ort

CHF 80’000 - 120’000

Vollzeit

Vor 30+ Tagen

Erhöhe deine Chancen auf ein Interview

Erstelle einen auf die Position zugeschnittenen Lebenslauf, um deine Erfolgsquote zu erhöhen.

Zusammenfassung

An established industry player is seeking an experienced Level 3 SOC Analyst to enhance their cybersecurity capabilities. This role involves proactive threat hunting and advanced incident detection using CrowdStrike and Microsoft Sentinel technologies. The ideal candidate will not only identify and neutralize potential threats but also mentor junior analysts, contributing to the overall maturity of the Security Operations Center (SOC). If you have a passion for cybersecurity and a drive to protect organizations from evolving threats, this opportunity is perfect for you.

Qualifikationen

  • Deep understanding of cybersecurity with a focus on CrowdStrike and Microsoft Sentinel.
  • Experience in threat hunting and incident response.

Aufgaben

  • Design and execute advanced threat-hunting campaigns.
  • Lead investigations into complex security incidents and provide recommendations.

Kenntnisse

Cybersecurity Expertise
Threat Hunting
Incident Response
Behavioral Analytics
Root Cause Analysis

Tools

CrowdStrike
Microsoft Sentinel

Jobbeschreibung

L3 SOC ANALYST POSITION

Overview:
My client (one of the largest MSSP’s in Europe) is looking for an experienced Level 3 SOC Analyst with a deep understanding of cybersecurity, specializing in CrowdStrike and Microsoft Sentinel technologies. This role focuses on proactive threat hunting, advanced incident detection, and response to ensure the security and resilience of our organization. The ideal candidate will leverage their expertise to identify and neutralize potential threats before they materialize while mentoring junior analysts and contributing to overall SOC maturity.


Key Responsibilities:


  1. Threat Hunting:
    • Design and execute advanced threat-hunting campaigns leveraging CrowdStrike and Microsoft Sentinel.
    • Proactively search for indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) across the environment.
    • Identify anomalous activity using advanced threat intelligence, behavioral analytics, and security data.
  2. Incident Response:
    • Lead investigations into complex security incidents and provide root cause analysis.
    • Create detailed incident reports and recommendations for remediation and future prevention.
    • Respond to and contain threats using CrowdStrike Falcon and Microsoft Sentinel tools.
  3. SIEM and EDR Management:
    • Configure and fine-tune detection rules in Microsoft Sentinel to improve alert fidelity.
    • Optimize the use of CrowdStrike Falcon’s capabilities for endpoint detection and response (EDR).
    • Develop and implement use cases, analytics, and dashboards to enhance visibility and security posture.
  4. Threat Intelligence Integration:
    • Integrate threat intelligence feeds into SOC workflows and tools.
    • Monitor and analyze trends in the threat landscape to identify potential risks.
Hol dir deinen kostenlosen, vertraulichen Lebenslauf-Check.
eine PDF-, DOC-, DOCX-, ODT- oder PAGES-Datei bis zu 5 MB per Drag & Drop ablegen.