5+ years of experience
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Job Category:
Information Services
See more jobs for students and recent grads who studied:
SOC Analyst lvl 3
Request Technology - Kyle Honn | Northbrook, Illinois
Tell Us More About Your Job Preferences
By telling us what you think of this job, we can help find jobs that match your interests. If you want to see more jobs like this, click on the smiley face. Or if this job isn't what you are looking for, click the frowny face. Learn More...

Follow This Company

Job Description

SOC Analyst Level 3 (1st Shift Or 2nd Shift)

The SOC Analyst will perform responsibilities as the technical lead and incident responder for Company's Security Operations Center. This means leading technical investigations for security incidents, overseeing process improvements, and driving implementation of new capabilities, serve as a technical escalation resource for other SOC Analysts and provide mentoring for skill development.

Job Responsibilities

Perform investigation and escalation for complex or high severity security threats or incidents.
Work with SIEM Engineering and other security partners developing and refining correlation rules.
Assist in defining and driving strategic initiatives.
Create and develop SOC processes and procedures working with Level 2 Analysts.
Define and assist in creation of operational and executive reports.
Define tool requirements to improve SOC capabilities
Provide leadership and technical guidance in project planning, task definition, estimating, reporting, scheduling, documentation, and workflow.

Job Qualifications

  • 10+ years of technical experience in Information Security, System Administration, or Network Engineering with at least 5 years of experience in Information Security.
  • College degree in a related field or equivalent work experience.
  • Experience in Security Operations and Incident Response.
  • Detailed practical knowledge of Internet protocols, Firewalls, load balancers, Routers, Switches, intrusion detection/prevention systems.
  • Ability to conduct multi-step breach and investigative analysis to trace the dynamic activities associated with advanced threats.
  • Advanced knowledge and expertise of using SIEM technologies for event investigation.
  • Advanced event analysis leveraging SIEM tools, incident investigation and response, log parsing and analysis.
  • Advanced knowledge of networking fundamentals (ie network layers, Ethernet, ARP, TCP/IP, etc), threat landscape (threat actors, cyber-crime, APT), and malware operations and indicators.
  • Advanced knowledge of penetration techniques, DDos mitigation techniques, IDS/IPS systems, Unix, Linux or Windows.
  • Experience with Data Loss Prevention, Scripting, forensic techniques, Wireshark, Gigastor, Netwitness, PCI, HIPPA, SOX.
  • Security certifications preferred (ie GCIH, GIAC, CEPT, CISSP, etc.)


Applicants must be eligible to work in the specified location

This company profile was created by AfterCollege and is about Request Technology - Kyle Honn. This page is not endorsed by or affiliated with Request Technology - Kyle Honn. For questions regarding company profiles, please email: care@aftercollege.com.