Senior SOC Consultant (L2-L3)
Senior SOC Consultant (L2-L3)
- 1 Vacancy
- 11 Views
Offer Salary
$25,000.00 - $35,000.00 /monthly
For Freelance
No
Job Description
Get AI-powered advice on this job and more exclusive features. Our client is looking for a Senior SOC Consultant (L2-L3) with strong experience in MSSP SOC operations, specializing in XDR, MDR, and SI...
Get AI-powered advice on this job and more exclusive features.
Our client is looking for a Senior SOC Consultant (L2-L3) with strong experience in MSSP SOC operations, specializing in XDR, MDR, and SIEM technologies. The role involves advanced incident response, SOC process development, analyst mentorship, and customer-facing engagement, including presales support.
Hands-on experience with CrowdStrike NG SIEM (LogScale) or Taegis is mandatory.
SOC Operations & Incident Response- Act as L2-L3 escalation point for security incidents and investigations
- Lead end-to-end incident response (triage, containment, RCA, recovery)
- Perform deep-dive analysis across XDR, SIEM, MDR, and EDR platforms
- Correlate threats across endpoint, network, cloud, identity, and email
- Develop and maintain SOPs, runbooks, playbooks, and escalation workflows
- Ensure compliance with MSSP SLAs, KPIs, and reporting standards
- Mentor L1/L2 analysts and support daily SOC operations
- Oversee shift handovers, alert queues, and quality assurance
- Conduct technical training on threat hunting and detection logic
- Perform proactive threat hunting using XDR/SIEM tools
- Develop and tune detection rules and correlation use cases
- Reduce false positives and improve detection accuracy
- Participate in customer review meetings and IR discussions
- Deliver monthly/quarterly reports, threat insights, and recommendations
- Support customer onboarding and SOC deployments
- Assist sales teams with technical workshops, demos, and solution design
- Support BoQ, proposals, SOWs, and service descriptions
- 7-9 years in cybersecurity with 6+ years in MSSP SOC operations
- Strong hands-on experience with:
- Threat hunting & root cause analysis
- Use-case and detection rule development
- Log analysis (endpoint, network, cloud, identity, email)
- Strong knowledge of MITRE ATT&CK, NIST CSF, ISO 27035, Cyber Kill Chain
- Experience handling ransomware, account compromise, lateral movement, insider threats, phishing
- Strong analytical and investigative mindset
- Excellent communication and customer-facing skills
- Ability to mentor junior analysts and lead small teams
- Strong documentation and reporting abilities
- Comfortable working in a fast-paced MSSP environment
Qualifications & Certifications (Preferred)
- Bachelor's degree in Computer Science, Cybersecurity, or related field
Certifications such as:
- CrowdStrike (CCSE, CCFA, CCFH, CCFR)
- Taegis / Secureworks / Sophos
- Splunk Core / Power User
- GCIA / GCIH / CISM
- Microsoft Security (SC-series)
- Share this job: