SOC Analyst L2 & L3 needed in Mississauga, ON for hybrid contract role. Must have SIEM, SOAR, and EDR experience.
Responsibilities
Ability to work with very large and complex network. Self-motivated individual and creative thinker who will take ownership of tasks and projects, able to work with the team, and manages tasks effectively and has a proven track record of consistent and organized outputs. The ideal candidate will demonstrate an eagerness to understand complex problems and requirements, an aptitude for translating these problems into workable designs and solutions, and will possess a keen eye for detail. Responsibilities include reviewing SIEM escalated incidents, qualifying true positives, providing monthly trend and security analysis summary reports, performing advanced triages, liaising between cross-functional teams, and advocating protection and mitigation strategies.
Requirements
4+ years for L2 and 8+ years for L3. Knowledge/experience on any SIEM tool (preferably SPLUNK) and SOAR tools (preferably TINES). Exposure to Mitre framework. Hands-on experience in EDR platforms (CROWDSTRIKE) and threat analysis, threat hunting/incident response. Experience in analyzing security incidents and responding methodically. Knowledge in Network security/System Security/Endpoint Security. Experience in event monitoring, analysis, and escalations. Provide inputs for content management. Experience on monthly, weekly, and daily reporting. Willing to work on 24/7 operations. Strong knowledge of Windows, Linux, and MAC operating systems. Strong understanding of cyber security threats and recent trends. Experience in creating rules in SIEM. Understanding of AI usage in cyber security. Good verbal/written communication skills. Client-facing technical analysis report and presentation skills.
Security Operations Lead designing Microsoft Sentinel and managing security operations at PwC. Collaborating with teams to enhance client security through advanced technology.
SOC Analyst monitoring detections for clients, executing response playbooks, and improving threat detection capabilities. Join Arctiq to protect organizations in today's digital landscape.
Lead SOC Analyst at IFS responsible for protecting global SaaS platform and internal systems. Collaborating across security teams to enhance security operations, detection, and response capabilities.
Senior Security Operations Engineer driving security incident response efforts for Affirm's systems and customers. Collaborating with teams to improve security posture and build automated playbooks.
Cybersecurity Analyst providing first - level incident response and client support at CDW. Monitoring security incidents, providing client communications, and engaging in professional development activities.
Business Development Manager responsible for sales engagements with Field Sales teams. Driving SecOps product revenue objectives and solving complex security challenges.
Security Operations Analyst part of Diligent’s Security team ensuring safety and compliance for personnel and assets. Monitoring security alerts and managing incident responses effectively.
Trust & Safety Senior Associate in InfoSec Ops at Instacart ensuring data safety through collaboration and operational management responsibilities. Focus on vendor data practices, audit readiness, and project leadership.