L3 SOC Monitoring Analyst Needed for Cybersecurity Operations

Remote Full-time
Experience: 8–10 Years Mode- Remote (Anywhere in the world) Role Type: Full-time | SOC Operations Language - Able to speak Portuguese and English (Portuguese is mandatory) Project will Start from January 2026 Shift - Rotational 24*7 (AS per USA EST time zone) Budget - Open #Role Summary# We are seeking an experienced L3 SOC Analyst to lead advanced monitoring, threat investigation, incident response, and escalation handling within a 24/7 Security Operations Center. The candidate must have deep expertise in SIEM platforms, especially Microsoft Sentinel and Microsoft Defender, along with strong analytical and incident-handling capabilities. Key Responsibilities 1. Perform advanced threat monitoring, investigation, and triage for security incidents. 2. Lead incident response, including containment, eradication, and recovery actions. 3. Manage and fine-tune SIEM rules, analytics, alerts, and correlation logic. 4. Act as escalation point for L1/L2 SOC Analysts and provide technical guidance. 5. Monitor and analyze threats through Microsoft Sentinel, Microsoft Defender, and other SIEM tools. 6. Conduct in-depth root cause analysis, malware analysis, and threat hunting activities. 7. Coordinate with internal teams and stakeholders during major incidents. 8. Create and update SOPs, incident reports, use cases, playbooks, and dashboards. 9. Support SOC optimization, tool integrations, and continuous improvement initiatives. #Required Skills & Expertise# β€’ 8–10 years of experience in SOC Monitoring, Incident Response, Threat Hunting, and security operations. β€’ Strong hands-on expertise with: 1. Microsoft Sentinel (KQL queries, analytics rules, workbooks). 2. Microsoft Defender Suite (Defender for Endpoint, Identity, Cloud Apps). 3. Enterprise SIEM platforms (rule creation, tuning, correlation, dashboards). β€’ Deep understanding of: Attack techniques (MITRE ATT&CK framework) Malware behavior Network security & endpoint security concepts Cloud security fundamentals β€’ Experience in handling critical incidents, major breaches, and IR workflows. β€’ Strong analytical, documentation, and communication skills. Preferred Certifications 1. Microsoft SC-200, SC-300, SC-100 2. CEH, ECSA, GCIH, GCIA, GCFA (preferred but not mandatory) Education Bachelor’s degree in Computer Science, IT, Cybersecurity, or equivalent. Apply tot his job
Apply Now β†’

Similar Jobs

Experienced Registered Behavior Technician for In-Home ABA Therapy - Atlanta, GA

Remote

Immediate Hiring: Experienced Registered Behavioral Technician (RBT) for Clinic-Based ABA Therapy Services

Remote

Experienced Registered Behavioral Technician (RBT) - ABA Therapy for Children with Autism Spectrum Disorder

Remote

Experienced Registered Nurse - Telehealth: Providing Remote Care Coordination and Patient Support

Remote

Experienced Substitute Teacher for Riverside County Schools - Join Scoot Education's Innovative Team

Remote

Experienced Substitute Teacher for San Bernardino County - Flexible Schedules & Competitive Pay

Remote

Experienced School Year Instructional Coach for High-Dosage Tutoring Programs in Edgewater Park, NJ

Remote

Experienced School Year Tutor for K-8 Students in Math and Literacy - Mickleton, NJ

Remote

Experienced Secondary Social Studies Teacher for Kansas - Flexible Hybrid Remote Arrangement

Remote

USPS Office Helper

Remote

**Work from Home Chat Support Specialist (No Calling, No Experience) at blithequark**

Remote

Accounts Payable Manager

Remote

2026 Summer Internship - FIFA World Cup Project

Remote

Customer Support Chat/Email Specialist

Remote

Newborn Ear Remoulding Clinician (MD, DO, PA, NP, or RN)

Remote

Project Manager - Nuclear Engineering

Remote

Chief Analytics Officer

Remote

CVS Customer Service Representative, $30/H Work From Home Opportunity

Remote

**Experienced Sales and Customer Service Coordinator – Front Desk Operations and Sales Success in Milford, MA at arenaflex**

Remote

Director – AI Leader

Remote
← Back