Arkansas Staffing
Senior Soc Analyst
Position: Senior SOC Analyst Location: Fully Remote Onsite Requirement: Remote 15 month initial contract, potential to extend or convert We can only work with candidates who can work directly on our W2 Description: Seeking a Senior SOC Analyst with in-depth expertise in Microsoft Sentinel, Microsoft Defender for Endpoint (MDE), Microsoft Purview, Azure Security, and the Microsoft 365 security suite. This role involves leading advanced threat detection and response activities, conducting proactive threat hunting, and optimizing our Microsoft security environment. The ideal candidate will also be responsible for mentoring junior SOC analysts, providing actionable insights, and translating complex technical findings into business-relevant information. Key Responsibilities: Advanced Monitoring & Detection: Perform real-time monitoring, detection, and response using Microsoft Sentinel, MDE, Purview, Azure Security Center, and M365 security tools. Proactive Threat Hunting: Conduct threat hunting exercises leveraging MITRE ATT&CK and Microsoft threat intelligence to identify potential threats before they impact the organization. Incident Investigation & Remediation: Lead investigations into complex security incidents, provide root cause analysis, and offer actionable remediation guidance. Develop & Optimize Analytics: Fine-tune Sentinel analytics rules, workbooks, and automation playbooks to enhance threat detection and response capabilities. Alert Analysis & Escalation: Analyze security alerts, classify their severity, escalate high-priority threats, and ensure timely follow-up. Compliance & Risk Management: Utilize Microsoft Purview for data loss prevention (DLP), insider risk management, and compliance monitoring to ensure security and regulatory standards are met. Collaboration & Vulnerability Management: Collaborate with IT and engineering teams to address vulnerabilities and strengthen overall security posture. Documentation & Reporting: Document investigations, lessons learned, and incident reports for leadership and compliance audits. Mentorship: Provide technical guidance and mentorship to junior SOC analysts, fostering a collaborative learning environment. Required Qualifications: Experience: 5+ years of hands-on experience in SOC operations, with at least 3 years in a senior or lead SOC analyst role. Technical Expertise: Proven expertise in Microsoft Sentinel (log analytics, KQL queries, rule creation, dashboards), Microsoft Defender for Endpoint (MDE), Microsoft Purview (DLP, insider risk), Azure Security (Azure AD, Conditional Access, security baselines), and Microsoft 365 Security & Compliance. Incident Response & Threat Hunting: Strong understanding of incident response, digital forensics, and threat hunting methodologies. Security Automation: Experience creating and maintaining security automation workflows (Logic Apps, SOAR, etc.). Frameworks & Methodologies: Familiarity with MITRE ATT&CK, cyber kill chain, and SOC playbooks. Communication Skills: Excellent verbal and written communication skills, with the ability to effectively interact with both technical and non-technical stakeholders. Preferred Qualifications: Certifications: Relevant certifications such as SC-100, -200, SC-300, AZ-500, CISSP, GIAC GCIA/GCED, or similar, GCIH Third-Party Integrations: Experience integrating Microsoft security tools with third-party platforms like SolarWinds, Palo Alto XSOAR, or similar. Compliance Knowledge: Familiarity with compliance frameworks (e.g., NIST SP 800-53, IRSPub1075, PCI DSS). Scripting & Automation: Proficiency in scripting (PowerShell, KQL, or similar languages) for automation and tool integration. Data Connector Management: Configure and maintain data connectors between Microsoft security tools and other platforms to ensure effective integration and data flow. Key Competencies: Analytical & Problem-Solving: Strong analytical skills and the ability to solve complex security problems quickly and efficiently.
Position: Senior SOC Analyst Location: Fully Remote Onsite Requirement: Remote 15 month initial contract, potential to extend or convert We can only work with candidates who can work directly on our W2 Description: Seeking a Senior SOC Analyst with in-depth expertise in Microsoft Sentinel, Microsoft Defender for Endpoint (MDE), Microsoft Purview, Azure Security, and the Microsoft 365 security suite. This role involves leading advanced threat detection and response activities, conducting proactive threat hunting, and optimizing our Microsoft security environment. The ideal candidate will also be responsible for mentoring junior SOC analysts, providing actionable insights, and translating complex technical findings into business-relevant information. Key Responsibilities: Advanced Monitoring & Detection: Perform real-time monitoring, detection, and response using Microsoft Sentinel, MDE, Purview, Azure Security Center, and M365 security tools. Proactive Threat Hunting: Conduct threat hunting exercises leveraging MITRE ATT&CK and Microsoft threat intelligence to identify potential threats before they impact the organization. Incident Investigation & Remediation: Lead investigations into complex security incidents, provide root cause analysis, and offer actionable remediation guidance. Develop & Optimize Analytics: Fine-tune Sentinel analytics rules, workbooks, and automation playbooks to enhance threat detection and response capabilities. Alert Analysis & Escalation: Analyze security alerts, classify their severity, escalate high-priority threats, and ensure timely follow-up. Compliance & Risk Management: Utilize Microsoft Purview for data loss prevention (DLP), insider risk management, and compliance monitoring to ensure security and regulatory standards are met. Collaboration & Vulnerability Management: Collaborate with IT and engineering teams to address vulnerabilities and strengthen overall security posture. Documentation & Reporting: Document investigations, lessons learned, and incident reports for leadership and compliance audits. Mentorship: Provide technical guidance and mentorship to junior SOC analysts, fostering a collaborative learning environment. Required Qualifications: Experience: 5+ years of hands-on experience in SOC operations, with at least 3 years in a senior or lead SOC analyst role. Technical Expertise: Proven expertise in Microsoft Sentinel (log analytics, KQL queries, rule creation, dashboards), Microsoft Defender for Endpoint (MDE), Microsoft Purview (DLP, insider risk), Azure Security (Azure AD, Conditional Access, security baselines), and Microsoft 365 Security & Compliance. Incident Response & Threat Hunting: Strong understanding of incident response, digital forensics, and threat hunting methodologies. Security Automation: Experience creating and maintaining security automation workflows (Logic Apps, SOAR, etc.). Frameworks & Methodologies: Familiarity with MITRE ATT&CK, cyber kill chain, and SOC playbooks. Communication Skills: Excellent verbal and written communication skills, with the ability to effectively interact with both technical and non-technical stakeholders. Preferred Qualifications: Certifications: Relevant certifications such as SC-100, -200, SC-300, AZ-500, CISSP, GIAC GCIA/GCED, or similar, GCIH Third-Party Integrations: Experience integrating Microsoft security tools with third-party platforms like SolarWinds, Palo Alto XSOAR, or similar. Compliance Knowledge: Familiarity with compliance frameworks (e.g., NIST SP 800-53, IRSPub1075, PCI DSS). Scripting & Automation: Proficiency in scripting (PowerShell, KQL, or similar languages) for automation and tool integration. Data Connector Management: Configure and maintain data connectors between Microsoft security tools and other platforms to ensure effective integration and data flow. Key Competencies: Analytical & Problem-Solving: Strong analytical skills and the ability to solve complex security problems quickly and efficiently.