Vivid Resourcing
Our client, a leading financial institution, is seeking an experienced
SOC Analyst
to join their Security Operations Center. You will play a critical role in monitoring, detecting, analyzing, and responding to cybersecurity incidents to protect sensitive financial data and ensure compliance with industry regulations. Key Responsibilities
Monitor SIEM and security tools for potential threats, anomalies, and suspicious activity. Investigate and triage alerts, escalating incidents when necessary. Perform root cause analysis on security events and recommend mitigations. Collaborate with Incident Response teams to contain and remediate threats. Document incidents, findings, and lessons learned in line with compliance standards (SOX, PCI-DSS, FFIEC). Support threat hunting activities and continuously improve detection capabilities. Stay updated on the latest threat intelligence, malware trends, and attack techniques. Requirements
5+ years experience as a SOC Analyst, Security Engineer, or Incident Responder. Strong knowledge of SIEM tools (Splunk, QRadar, Sentinel, or similar). Familiarity with EDR tools (CrowdStrike, Defender for Endpoint, Carbon Black). Good understanding of MITRE ATT&CK, malware analysis, phishing, and threat vectors. Knowledge of networking protocols (TCP/IP, DNS, HTTP, etc.) and log analysis. Experience in regulated industries (preferably Banking/Finance). Seniority level
Mid-Senior level Employment type
Contract Job function
Information Technology Industries
Banking #J-18808-Ljbffr
SOC Analyst
to join their Security Operations Center. You will play a critical role in monitoring, detecting, analyzing, and responding to cybersecurity incidents to protect sensitive financial data and ensure compliance with industry regulations. Key Responsibilities
Monitor SIEM and security tools for potential threats, anomalies, and suspicious activity. Investigate and triage alerts, escalating incidents when necessary. Perform root cause analysis on security events and recommend mitigations. Collaborate with Incident Response teams to contain and remediate threats. Document incidents, findings, and lessons learned in line with compliance standards (SOX, PCI-DSS, FFIEC). Support threat hunting activities and continuously improve detection capabilities. Stay updated on the latest threat intelligence, malware trends, and attack techniques. Requirements
5+ years experience as a SOC Analyst, Security Engineer, or Incident Responder. Strong knowledge of SIEM tools (Splunk, QRadar, Sentinel, or similar). Familiarity with EDR tools (CrowdStrike, Defender for Endpoint, Carbon Black). Good understanding of MITRE ATT&CK, malware analysis, phishing, and threat vectors. Knowledge of networking protocols (TCP/IP, DNS, HTTP, etc.) and log analysis. Experience in regulated industries (preferably Banking/Finance). Seniority level
Mid-Senior level Employment type
Contract Job function
Information Technology Industries
Banking #J-18808-Ljbffr