Role: SOC Analyst
Top 3 Skills: SQL, Splunk, Log Analysis and Scripting (Python or Shell)
Duration/Shift: 24x7x365 support staff. This specific position requires the ability to work Swing and/or Graveyard shifts with rotations into Day shift.
Type: W2 Contract
Location: San Jose, CA
Requirement:
- 3-5 years of professional experience Monitoring SIEM Platforms
- Experience with Daily analysis of logs and dashboards
- Hands on with Splunk Queries and SQL really well for analysis of log data
- Identify and mitigate information-security threats.
- Defend and respond daily to keep critical information assets away from threats and hackers.
- Extensive experience providing analysis and trending of security log data from many heterogeneous security devices.