L3 SOC Monitoring Analyst Needed for Cybersecurity Operations

Remote, USA Full-time
Experience: 8–10 YearsMode-Remote (Anywhere in the world)Role Type: Full-time | SOC OperationsLanguage - Able to speak Portuguese and English (Portuguese is mandatory)Project will Start from January 2026Shift - Rotational 24*7 (AS per USA EST time zone)Budget - Open#Role Summary#We are seeking an experienced L3 SOC Analyst to lead advanced monitoring, threat investigation, incident response, and escalation handling within a 24/7 Security Operations Center. The candidate must have deep expertise in SIEM platforms, especially bolthires Sentinel and bolthires Defender, along with strong analytical and incident-handling capabilities.Key Responsibilities1. Perform advanced threat monitoring, investigation, and triage for security incidents. 2. Lead incident response, including containment, eradication, and recovery actions. 3. Manage and fine-tune SIEM rules, analytics, alerts, and correlation logic. 4. Act as escalation point for L1/L2 SOC Analysts and provide technical guidance. 5. Monitor and analyze threats through bolthires Sentinel, bolthires Defender, and other SIEM tools. 6. Conduct in-depth root cause analysis, malware analysis, and threat hunting activities.7. Coordinate with internal teams and stakeholders during major incidents. 8. Create and update SOPs, incident reports, use cases, playbooks, and dashboards. 9. Support SOC optimization, tool integrations, and continuous improvement initiatives. #Required Skills & Expertise#• 8–10 years of experience in SOC Monitoring, Incident Response, Threat Hunting, and security operations. • Strong hands-on expertise with:1. bolthires Sentinel (KQL queries, analytics rules, workbooks). 2. bolthires Defender Suite (Defender for Endpoint, Identity, Cloud Apps).3. Enterprise SIEM platforms (rule creation, tuning, correlation, dashboards). • Deep understanding of:Attack techniques (MITRE ATT&CK framework)Malware behaviorNetwork security & endpoint security conceptsCloud security fundamentals• Experience in handling critical incidents, major breaches, and IR workflows. • Strong analytical, documentation, and communication skills. Preferred Certifications1. bolthires SC-200, SC-300, SC-1002. CEH, ECSA, GCIH, GCIA, GCFA (preferred but not mandatory)EducationBachelor’s degree in Computer Science, IT, Cybersecurity, or equivalent.Apply tot his job
Apply Now

Similar Jobs

Agile Project Manager - Cybersecurity (Federal Consulting) Remote / Telecommute Jobs

Remote, USA Full-time

Program Manager - Cyber Security

Remote, USA Full-time

Cybersecurity Managing Consultant – Energy Providers

Remote, USA Full-time

Cybersecurity Risk Manager

Remote, USA Full-time

Senior Cyber Security Architecture & Engineering Manager

Remote, USA Full-time

Senior Counsel, Cybersecurity and Incident Response (Remote)

Remote, USA Full-time

Lead Cybersecurity Engineer, Privileged & Password Management

Remote, USA Full-time

Senior Principal Cybersecurity Engineer job at GM Financial in Arlington, TX, Irving, TX

Remote, USA Full-time

cybersecurity engineer sr. (Hybrid Seattle)

Remote, USA Full-time

PAM Engineer - BeyondTrust (REMOTE)

Remote, USA Full-time

Principal Data Scientist, Search – Telecommute

Remote, USA Full-time

Project Documentation Coordinator; White Plains

Remote, USA Full-time

Chief Cybersecurity Technology Director (IT Cyber Security Administrator 1)

Remote, USA Full-time

Internal Audit Associate

Remote, USA Full-time

Healthcare Consulting Analyst - Q3/Q4 2026 Start Dates (Spring 2026 Graduates)

Remote, USA Full-time

Remote Healthcare Recruiter (Evenings Optional), 100% Commission + Productivity Incentives - Part Ti

Remote, USA Full-time

Visual Designers

Remote, USA Full-time

Licensed Inside Sales Representative (Remote - Home Based Work)

Remote, USA Full-time

Analyst – Underwriting – Ciera Bank – Fort Worth, TX

Remote, USA Full-time

Data Architect Lead/Agile Program Manager- REMOTE

Remote, USA Full-time
Back to Home