Full-Time Level 3 SOC Analyst
Telefonica Tech is hiring a remote Full-Time Level 3 SOC Analyst. The career level for this job opening is Expert and is accepting UK based applicants remotely. Read complete job description before applying.
Telefonica Tech
Job Title
Posted
Career Level
Career Level
Locations Accepted
Share
Job Details
Level 3 SOC Analyst - Remote, UK
As a Level 3 SOC Analyst, you will provide expert-level analysis and response to security incidents and threats within the organization. You will work closely with Level 1 and Level 2 analysts to investigate and remediate security incidents, and will provide guidance and support to junior team members as needed. Your expertise will be critical in ensuring the security of the organization's networks, systems, and data, and you will be expected to stay up-to-date on the latest threats and trends in the cybersecurity landscape.
You will be responsible for using a variety of tools and technologies to identify, investigate, and respond to security incidents, including Cortex, Falcon, Microsoft Sentinel, Defender for Endpoint, Tenable IO, Defender Threat Hunting, and OpenCTI.
- Perform advanced analysis of security events and alerts, using a combination of manual techniques and automated tools to identify potential security incidents.
- Provide expert guidance and support to Level 1 and Level 2 analysts in the investigation and remediation of security incidents.
- Use Cortex, Falcon, Microsoft Sentinel, Defender for Endpoint, Tenable IO, Defender Threat Hunting, and OpenCTI to perform threat hunting and identify potential security risks.
- Work closely with other members of the SOC team to develop and implement new security policies and procedures, as needed.
- Stay up-to-date on the latest cybersecurity threats and trends, and provide regular updates and recommendations to senior management.
- Participate in incident response activities, including on-call rotations, and provide expert-level support during major security incidents.
Qualifications/Certifications:
At least experience working in a security operations center or similar environment. Strong knowledge of cybersecurity principles and best practices. Deep practical knowledge of Palo Alto Cortex and/or XSIAM. Some experience working with Microsoft Sentinel and/or CrowdStrike Falcon. Ability to work independently and as part of a team. Excellent communication skills, with the ability to explain complex technical issues to non-technical stakeholders.