Negotiable
Outside
Remote
New York City, New York
Summary: The role of SOC Analyst involves a 3-4 month contract focused on incident triage and cybersecurity within a fast-growing team. The position requires hands-on experience with AWS Cloud security tools and SIEM alerts, emphasizing collaboration and innovation in a remote setting. Candidates should possess at least 2 years of relevant experience, particularly in cloud environments. This opportunity offers a chance to enhance skills while contributing to the protection of critical data and systems.
Key Responsibilities:
- Conduct hands-on incident triage and remediation.
- Investigate and analyze incidents using SIEM, AWS, and endpoint detection tools.
- Collaborate with team members and report findings.
- Utilize AWS Cloud security tools and respond to alerts.
- Engage in phishing detection and incident response processes.
Key Skills:
- Minimum 2 years of experience as an SOC Analyst.
- Experience in triaging incidents from SIEM alerts, endpoint detection tools, and phishing detection.
- Familiarity with AWS Cloud alerts and tools such as GuardDuty and CloudTrail.
- Hands-on experience with common SOC tools (e.g., Splunk, CrowdStrike).
- Solid understanding of cybersecurity frameworks and incident response processes.
- Strong communication and collaboration skills.
Salary (Rate): 42.50
City: New York City
Country: United States
Working Arrangements: remote
IR35 Status: outside IR35
Seniority Level: Mid-Level
Industry: IT