
Search by job, company or skills
SOC Analyst L3
Job Title: Level 3 Security Operations Center (SOC) Analyst
Job Type: Full-Time / Contract
Job Overview:
As a Level 3 SOC Analyst, you will lead advanced threat hunting, detection engineering, and incident response planning activities within a 24/7 MSSP environment. You'll act as a strategic escalation point for complex incidents and bridge threat intelligence, engineering, and client-facing security functions. You will also be responsible for delivering high-impact deliverables, such as Threat Intelligence Digests, Alert Tuning Reports, and Customer-Facing Security Presentationsall aligned to operational SLAs and governance frameworks.
This role requires strong leadership, technical expertise in modern SIEM and EDR platforms (especially Microsoft Sentinel), and experience in executing MSSP service delivery obligations, including IR tabletop exercises, SLA/KPI dashboards, and quarterly threat reviews.
Key Responsibilities:
1. Advanced Threat Hunting & Detection Engineering
2. Threat Intelligence & Operational Reporting
3. Alert Tuning & Detection Optimization
4. Incident Response Leadership & Crisis Escalation
5. MSSP Reporting & Executive Briefings
6. IR Tabletop Exercise Management
7. SOC Governance & Pre-Onboarding Support
Required Skills & Qualifications:
1.Education:
Bachelor's Degree in Cybersecurity, Computer Science, Information Systems, or related field.
Master's Degree is a plus.
2.Certifications (Preferred):
Microsoft Certified: Security Operations Analyst Associate
GIAC (GCIA, GCIH, GCFA, GNFA)
CompTIA CySA+, CASP+, or equivalent
MITRE ATT&CK Defender (MAD) certification is advantageous
3.Technical Skills:
Expert in SIEM technologies (Microsoft Sentinel preferred), KQL, log analysis, and data correlation.
Hands-on experience with EDR tools (Defender for Endpoint, CrowdStrike, etc.).
Strong knowledge of MITRE ATT&CK, NIST IR lifecycle, and threat modeling.
Familiarity with threat intel platforms (MISP, Anomaly, Recorded Future).
Understanding of cloud security (Azure, M365, hybrid environments).
4.Soft Skills:
Strong presentation and documentation skills, especially for executive and customer audiences.
Proven ability to lead and manage cross-functional engagements (internal & external).
Analytical mindset with an investigative approach to threat detection.
Ability to work independently in high-pressure and time-sensitive environments.
Proven English communication skills supported by professional certifications such as IELTS, TOEIC, or BEC.
Ability to write technical and executive-level documentation in English, including reports, presentations, and incident summaries.
Experience:
8-10+ years of experience in cybersecurity operations, with at least 2 years in a Level 2 or Level 3 SOC role.
Experience in delivering threat hunts, writing detection content, and handling major security incidents.
Prior MSSP experience or customer-facing security role is a significant advantage.
Job ID: 144970657