HumanBit Logo

DTICI_CSOC L3 Specialist | Codersbrain

full-time
Posted on June 14, 2025

Job Description

C-SOC Level 3 Analyst

Company Overview

Company information is not specified.

Job Summary

The C-SOC Level 3 Analyst is responsible for advanced incident response activities, comprehensive log analysis, and detailed incident reporting. This role is critical in enhancing the efficiency of incident response within a Security Operations Center (SOC) and contributes to the organization's overall cybersecurity posture.

Responsibilities

  • Conduct advanced incident response activities and provide comprehensive log analysis.
  • Perform detailed incident reporting and documentation.
  • Utilize tools such as THOR Scanner, VMRay, and Recorded Future Sandbox for malware analysis and threat hunting.
  • Analyze email logs to trace phishing attacks and other email-related threats.
  • Collaborate with Cyber Incident Response (CIR) teams to manage security incidents effectively.
  • Maintain and manage the SOC Knowledgebase, including playbooks, processes, and contacts.
  • Review and analyze user access logs to identify unauthorized or suspicious activities.
  • Refine and tune alerting systems to reduce false positives and enhance detection capabilities.

Qualifications

  • Proficient in malware analysis and threat hunting techniques.
  • Skilled in using advanced tools for detecting and analyzing sophisticated threats.
  • Strong understanding of Microsoft Security Products, including MS Defender for Endpoint, Cloud, Identity, AV, and MS Sentinel.
  • Knowledgeable in application, cloud, and infrastructure security, including firewalls, proxies, and Web Application Firewalls (WAF).
  • Expertise in utilizing SIEM (Security Information and Event Management) systems and IDS/IPS (Intrusion Detection/Prevention Systems).
  • Strong analytical skills to interpret complex datasets and identify security threat patterns.
  • Capable of conducting in-depth technical analyses of incidents.
  • Willingness to work in 24/7 rotational shifts, including weekends.

Preferred Skills

  • Experience using sandbox environments for malware behavior analysis.
  • Ability to provide technical feedback to internal security teams.
  • Familiarity with refining alerting systems based on insights from incident investigations.

Experience

  • Minimum of 0 years of experience in a cybersecurity role, with a focus on incident response and analysis.

Environment

  • Location information is not specified; the position is full-time.
  • Must be flexible to work in 24/7 rotational shifts.

Salary

  • Salary information is not specified.

Growth Opportunities

  • Opportunities for career advancement within the organization are not specified.

Benefits

  • Benefits information is not specified.
Powered by
HumanBit Logo