Experienced L2 Security Operations Center Analyst for 3rd Shift Remote Position - 12 Months Contract Opportunity in Advanced Threat Detection and Incident Response
Introduction to Workwarp and the Role
Workwarp, a leading innovator in cybersecurity solutions, is seeking an experienced and skilled L2 Security Operations Center (SOC) Analyst to join our team on a 12-month contract basis. As a remote position, you will have the flexibility to work from the comfort of your own home, with a schedule that includes 10-hour shifts, four days a week, from Thursday to Sunday, covering our 3rd shift operations. This is an exceptional opportunity for a talented cybersecurity professional to contribute to the protection and security of our clients' networks and systems, working in a dynamic and fast-paced environment that values innovation, collaboration, and excellence.
Position Overview
In this critical role, you will be responsible for conducting advanced technical investigations into critical incidents, providing swift remediation advice, and enhancing customer security postures. Your expertise in analyzing infected hosts, network traffic, and complex log analysis will be crucial in identifying attacker activity and handling forensic and malware analysis requests. As a key member of our Security Monitoring team, you will utilize your in-depth technical knowledge to design procedures for detecting threat actors' behavior, develop standard technical procedures (runbooks), and perform event stream tuning for systems efficiency.
Key Responsibilities
- Conduct advanced technical investigations for critical incidents, focusing on specific analysis and fast remediation advice to improve customer security postures.
- Analyze infected hosts or network traffic to identify attacker activity and handle specific forensic and malware analysis requests.
- Perform event correlation reviews through incoming data feeds, ticketing systems, and security alert mechanisms.
- Provide context on complex security incidents from customer and other available resources, collect and assemble data, and contribute to technical reports.
- Utilize in-depth technical knowledge to design procedures for the detection of threat actors' behavior and develop standard technical procedures (runbooks) for the Security Monitoring team.
- Perform event stream tuning utilizing internal tools, metrics, and experience involving key security concepts for systems efficiency.
- Review security-related events, assess their risk and validity based on available network, endpoint, and global threat intelligence information.
- Research and make recommendations for applying MITRE Telecommunication&CK and NIST framework-aligned strategies to the customer's environment.
Essential Qualifications
To be successful in this role, you will need to possess a combination of technical skills, knowledge, and experience in cybersecurity, including:
- A strong foundation in computer systems, networks, and cybersecurity principles.
- Experience working in a Security Operations Center (SOC) or similar environment, with a focus on threat detection and incident response.
- Advanced technical skills in areas such as malware analysis, forensic analysis, and log analysis.
- Proficiency in utilizing security tools and technologies, including SIEM systems, threat intelligence platforms, and security orchestration tools.
- Excellent analytical and problem-solving skills, with the ability to think critically and outside the box.
- Strong communication and collaboration skills, with the ability to work effectively in a remote team environment.
Preferred Qualifications
While not essential, the following qualifications and experience will be highly regarded:
- Relevant industry certifications, such as CompTIA Security+, CISSP, or CEH.
- Experience working with cloud-based security solutions and technologies.
- Knowledge of MITRE Telecommunication&CK and NIST frameworks, as well as other industry standards and best practices.
- Programming skills in languages such as Python, PowerShell, or C++.
- Experience with automation tools and scripting, such as Ansible or SaltStack.
Skills and Competencies
To excel in this role, you will need to demonstrate the following skills and competencies:
- Technical expertise: A deep understanding of cybersecurity principles, threat detection, and incident response.
- Analytical skills: The ability to analyze complex data sets, identify patterns, and draw meaningful conclusions.
- Problem-solving skills: The ability to think critically and creatively, with a focus on resolving complex technical problems.
- Communication skills: The ability to communicate technical information effectively to both technical and non-technical stakeholders.
- Collaboration skills: The ability to work effectively in a remote team environment, with a focus on collaboration and knowledge sharing.
Career Growth Opportunities and Learning Benefits
At Workwarp, we are committed to the growth and development of our employees. As an L2 SOC Analyst, you will have access to a range of training and development opportunities, including:
- On-the-job training and mentorship from experienced cybersecurity professionals.
- Access to industry-leading training and certification programs.
- Opportunities for career advancement and professional growth within the company.
- A collaborative and dynamic work environment that encourages knowledge sharing and innovation.
Work Environment and Company Culture
At Workwarp, we pride ourselves on our positive and inclusive company culture. As a remote employee, you will be part of a global team that values flexibility, work-life balance, and open communication. Our company culture is built on the following core values:
- Innovation: We encourage creativity, innovation, and outside-the-box thinking.
- Collaboration: We believe in the power of teamwork and collaboration to achieve common goals.
- Excellence: We strive for excellence in everything we do, from our products and services to our customer support and employee development.
- Integrity: We operate with integrity, transparency, and honesty in all our interactions, both internally and externally.
Compensation, Perks, and Benefits
We offer a competitive salary and benefits package, including:
- A competitive salary that reflects your skills and experience.
- A range of benefits, including health insurance, retirement savings, and paid time off.
- Access to cutting-edge technologies and tools, as well as ongoing training and development opportunities.
- A flexible and remote work environment that allows you to work from anywhere.
Conclusion
If you are a motivated and experienced cybersecurity professional looking for a new challenge, we encourage you to apply for this exciting opportunity. As an L2 SOC Analyst at Workwarp, you will be part of a dynamic and innovative team that is dedicated to protecting and securing our clients' networks and systems. With a competitive salary, comprehensive benefits package, and opportunities for career growth and development, this is an opportunity not to be missed. Apply today and join our team of cybersecurity experts in shaping the future of threat detection and incident response.
Apply for this job