Search by job, company or skills

Hays

SOC L3 Analyst

new job description bg glownew job description bg glownew job description bg svg
  • Posted 6 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

  • Role Summary: Senior escalation point responsible for advanced threat detection, complex incident analysis, use‑case development, custom parsing, and guiding SOC maturity.
  • Key Responsibilities
  • Lead high‑severity incident investigations, threat hunting, and root‑cause analysis.
  • Perform deep log analysis across endpoint, network, cloud, identity, and application sources.
  • Develop custom log parsers for non‑standard log sources and ensure accurate telemetry ingestion.
  • Build and fine‑tune use cases, correlation rules, and behavioral detections aligned with MITRE ATT&CK.
  • Conduct proactive threat hunting and detection tuning to reduce false positives.
  • Provide guidance to L1/L2 teams and support playbook improvements.
  • Prepare technical and executive‑level incident reports and provide remediation guidance.
  • Required Skills
  • Strong expertise in EDR, SIEM, SOAR, and security telemetry analysis.
  • Advanced knowledge of incident response, malware behavior, cloud logs, network forensics, and identity analytics.
  • Skilled in YARA/Sigma/behavior-based detections and rule tuning.
  • Ability to correlate multi-source logs and reconstruct full attack chains.
  • Familiar with NCA, SAMA, ISO 27001, and MITRE ATT&CK frameworks.
  • Preferred Experience & Certifications
  • 5–8+ years in SOC, DFIR, or detection engineering roles.
  • GIAC GCIA/GCIH/GCFA/GCTI, CISSP, CySA+, or equivalent.

More Info

Job Type:
Industry:
Function:
Employment Type:

About Company

Job ID: 145457499

Similar Jobs