SOC Analyst

at  alliantgroup

Houston, TX 77056, USA -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate22 Jan, 2025Not Specified23 Oct, 20242 year(s) or aboveIncident Handling,Information Technology,Malware Analysis,Python,Escalation,Edr,Vendors,Communication Skills,Cissp,Scripting Languages,Ips,Gcia,Powershell,Automation,Gcih,Security ToolsNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

alliantgroup, LP is currently experiencing explosive growth! As a national consulting firm focused on being the voice to the middle market, our mission is simple: Strengthening American businesses. How do we do this? We hire the brightest talent with the most diverse backgrounds who are passionate about making a difference. It’s fun to work in a company where people truly BELIEVE in what they’re doing!
About Us:
Alliant Cybersecurity is a leading provider of cutting-edge cybersecurity solutions, committed to defending businesses against evolving threats. Our Security Operations Center (SOC) monitors, detects, and responds to security incidents 24/7, ensuring the highest level of security for our clients. We are looking for a highly skilled and experienced Level 3 SOC Analyst to join our team.
Position Overview:
The Level 3 SOC Analyst will play a crucial role in the investigation and resolution of advanced cybersecurity incidents. As a senior member of the SOC, you will lead incident response efforts, perform in-depth analysis, and guide junior analysts through complex investigations. This role includes advanced threat hunting, optimizing security processes, and driving efficiency through automation. In addition, you will be involved in customer and vendor interactions, including pre-sales and post-sales support.

Key Responsibilities:

  • Lead incident response efforts and coordinate with various teams to contain and mitigate security threats.
  • Perform advanced threat hunting, proactively detecting and responding to malicious activities across multiple environments.
  • Analyze and interpret complex security alerts, logs, and network traffic to identify potential intrusions or security events.
  • Conduct root cause analysis for incidents and provide detailed recommendations for future prevention.
  • Engage in fine-tuning of security tools and systems (e.g., SIEM, IDS/IPS, EDR) to improve detection accuracy and response efficiency.
  • Develop, implement, and optimize automation solutions to streamline SOC operations and increase operational efficiency.
  • Manage vendor relationships and engage in support calls to resolve security tool issues and escalate as needed.
  • Participate in customer calls to address security issues, provide expert-level support, and ensure customer satisfaction.
  • Collaborate with the sales team on pre-sales and post-sales calls to assist with technical discussions, demonstrate security capabilities, and address client needs.
  • Develop, maintain, and optimize SOC processes, playbooks, and standard operating procedures (SOPs).
  • Mentor and guide Level 1 and Level 2 SOC Analysts, providing technical support and direction on complex investigations.
  • Stay up-to-date with the latest cybersecurity trends, attack vectors, and threat landscapes.
  • Produce detailed reports and presentations for senior management and clients on incident findings, threat intelligence, and trends.

Qualifications:

  • Bachelor’s degree in Cybersecurity, Information Technology, or a related field (or equivalent experience).
  • 7+ years of experience in a SOC environment, with at least 2 years at a senior or Level 3 role.
  • Expertise in threat hunting, incident handling, and advanced malware analysis.
  • Strong understanding of SIEM platforms and other security technologies (IDS/IPS, EDR, firewalls, etc.).
  • Experience in fine-tuning security tools and implementing automation in SOC processes.
  • Familiarity with scripting languages (Python, PowerShell) for automating tasks and processes.
  • Experience working directly with vendors for support and escalation of security tool issues.
  • Proven ability to engage with customers, providing support on issue resolution calls and participating in pre-sales and post-sales discussions.
  • Relevant certifications such as CISSP, CEH, GCIA, GCIH, or similar are preferred.
  • Excellent problem-solving skills and the ability to think critically under pressure.
  • Strong communication skills and the ability to work effectively with cross-functional teams.
  • Ability to mentor and lead junior analysts, fostering a collaborative and growth-oriented environment.

LI-BD

Responsibilities:

  • Lead incident response efforts and coordinate with various teams to contain and mitigate security threats.
  • Perform advanced threat hunting, proactively detecting and responding to malicious activities across multiple environments.
  • Analyze and interpret complex security alerts, logs, and network traffic to identify potential intrusions or security events.
  • Conduct root cause analysis for incidents and provide detailed recommendations for future prevention.
  • Engage in fine-tuning of security tools and systems (e.g., SIEM, IDS/IPS, EDR) to improve detection accuracy and response efficiency.
  • Develop, implement, and optimize automation solutions to streamline SOC operations and increase operational efficiency.
  • Manage vendor relationships and engage in support calls to resolve security tool issues and escalate as needed.
  • Participate in customer calls to address security issues, provide expert-level support, and ensure customer satisfaction.
  • Collaborate with the sales team on pre-sales and post-sales calls to assist with technical discussions, demonstrate security capabilities, and address client needs.
  • Develop, maintain, and optimize SOC processes, playbooks, and standard operating procedures (SOPs).
  • Mentor and guide Level 1 and Level 2 SOC Analysts, providing technical support and direction on complex investigations.
  • Stay up-to-date with the latest cybersecurity trends, attack vectors, and threat landscapes.
  • Produce detailed reports and presentations for senior management and clients on incident findings, threat intelligence, and trends


REQUIREMENT SUMMARY

Min:2.0Max:7.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Other

Graduate

Cybersecurity information technology or a related field (or equivalent experience

Proficient

1

Houston, TX 77056, USA