We are looking for a SOC Investigation Specialist to review, monitor, and evaluate SOC alerts and investigation outputs based on predefined scenarios and criteria. The ideal candidate will have 3+ years of hands-on experience as a SOC analyst in a production SOC environment and strong understanding of alert triage, incident investigation workflows, and evidence-based decision-making under time constraints.
Requirements
- 3+ years of hands-on experience as a SOC analyst in a production SOC environment
- Strong understanding of alert triage, incident investigation workflows, and evidence-based decision-making under time constraints
- Mandatory hands-on experience with Splunk
- Fluent English (written and spoken) with strong documentation and communication skills
Benefits
- Competitive hourly rate ($70–$95/hour)
- Opportunity to work with a leading AI research lab
Originally posted on Himalayas