This is a remote position.
Job Title: Security SOC Engineer
Work Type: Remote
Employment Type: Contract (C2C)
Visa: No OPT/CPT
Role Overview:
We are seeking an experienced Security SOC Engineer to provide hands-on analyst coverage for a customers monitoring environment. The ideal candidate will support alert triage incident coordination escalation management and operational governance to ensure a secure go-live and ongoing SOC stability. This is a short-term engagement with potential extension supporting a production security environment.
Project Responsibilities:
- Provide SOC analyst coverage to review and respond to alerts and incidents generated by the customers monitoring setup
- Coordinate incident response activities and escalation decisions including IT and OT collaboration where required
- Establish and document minimum operational runbooks
- Develop reporting structure and governance processes to ensure smooth go-live and steady-state operations
Key Duties:
Onboarding & Access Management
- Create analyst accounts and assign tool permissions
- Validate VPN/jump host connectivity
- Ensure appropriate role-based access to security tools
Alert Monitoring & Triage
- Acknowledge and analyze security alerts
- Enrich and classify alerts based on severity
- Route incidents and create cases/tickets as per defined processes
Incident Coordination
- Initiate and manage incident bridge calls
- Coordinate with internal teams vendors and stakeholders
- Maintain incident timelines and ensure documentation of key decisions
Escalation Management
- Follow established severity models and escalation matrix
- Notify on-call teams and external vendors when required
- Ensure timely resolution and closure of security incidents
Reporting
- Provide daily operational summaries
- Prepare detailed incident reports
- Conduct post-incident reviews and document lessons learned
Technical Environment:
Experience working with the following tools is required:
- CrowdStrike (SIEM EDR Vulnerability Management)
- Nozomi
- Fortinet / FortiGate Firewalls
Required Qualifications:
- 8 years of hands-on SOC experience in alert triage and incident response
- Experience working in enterprise monitoring environments
- Knowledge of escalation procedures and severity models
- Ability to manage incident bridges and cross-functional coordination
- Strong documentation and reporting skills
- Experience supporting secure production go-live environments
- Excellent communication skills (written and verbal)
This is a remote position.Job Title: Security SOC Engineer Work Type: Remote Employment Type: Contract (C2C)Visa: No OPT/CPT Role Overview: We are seeking an experienced Security SOC Engineer to provide hands-on analyst coverage for a customers monitoring environment. The ideal candidate will su...
This is a remote position.
Job Title: Security SOC Engineer
Work Type: Remote
Employment Type: Contract (C2C)
Visa: No OPT/CPT
Role Overview:
We are seeking an experienced Security SOC Engineer to provide hands-on analyst coverage for a customers monitoring environment. The ideal candidate will support alert triage incident coordination escalation management and operational governance to ensure a secure go-live and ongoing SOC stability. This is a short-term engagement with potential extension supporting a production security environment.
Project Responsibilities:
- Provide SOC analyst coverage to review and respond to alerts and incidents generated by the customers monitoring setup
- Coordinate incident response activities and escalation decisions including IT and OT collaboration where required
- Establish and document minimum operational runbooks
- Develop reporting structure and governance processes to ensure smooth go-live and steady-state operations
Key Duties:
Onboarding & Access Management
- Create analyst accounts and assign tool permissions
- Validate VPN/jump host connectivity
- Ensure appropriate role-based access to security tools
Alert Monitoring & Triage
- Acknowledge and analyze security alerts
- Enrich and classify alerts based on severity
- Route incidents and create cases/tickets as per defined processes
Incident Coordination
- Initiate and manage incident bridge calls
- Coordinate with internal teams vendors and stakeholders
- Maintain incident timelines and ensure documentation of key decisions
Escalation Management
- Follow established severity models and escalation matrix
- Notify on-call teams and external vendors when required
- Ensure timely resolution and closure of security incidents
Reporting
- Provide daily operational summaries
- Prepare detailed incident reports
- Conduct post-incident reviews and document lessons learned
Technical Environment:
Experience working with the following tools is required:
- CrowdStrike (SIEM EDR Vulnerability Management)
- Nozomi
- Fortinet / FortiGate Firewalls
Required Qualifications:
- 8 years of hands-on SOC experience in alert triage and incident response
- Experience working in enterprise monitoring environments
- Knowledge of escalation procedures and severity models
- Ability to manage incident bridges and cross-functional coordination
- Strong documentation and reporting skills
- Experience supporting secure production go-live environments
- Excellent communication skills (written and verbal)
View more
View less