📢 Please read the full job description carefully before applying to ensure your skills align with the role requirements. This position requires on-site presence in San Jose, CA, and involves a swing shift schedule (no overnight shifts).
Role: SOC Analyst
Skills: Splunk/SQL/Analytics/EDR/Alerts/Threat/SIEM
Work Location: San Jose, CA (Onsite)
Duration: 12+ months (Extension Possible)
Only W2 Contract
Shift Details:
- Standard shift: 2:00 PM – 10:00 PM (Subject to slight changes, no overnight shifts)
- 4-day work week with 10-hour shifts
- 3 days off
- Role is part of a 24x7x365 support team; candidates must be open to working swing and/or graveyard shifts with occasional rotation into day shifts.
About the Job:
We're looking for a SOC Analyst to support cybersecurity operations through incident detection, analysis, and response. This role involves working with tools like Splunk, SQL, EDR, and Unix Shell to investigate security threats and identify anomalies across Windows and Unix systems. Strong log analysis skills and basic scripting experience are essential to trace incidents to their root cause.
Responsibilities:
- Security Operations Center (SOC) support, cyber analysis, scripting, and automation.
- Cyber analysis Splunk Queries and SQL for analysis of log data and Analytics.
- Should have some scripting or coding experience in any language. Unix Shell, Python, Javascript, or any other.
- Identify and mitigate information-security threats.
- Solve complex security problems
- Defend and respond daily to keep critical information assets away from threats and hackers.
- Extensive experience providing analysis and trending of security log data from many heterogeneous security devices.
Note: The SOC Analyst will leverage tools such as SQL queries, EDR (Endpoint Detection and Response), log analysis, Unix, and shell scripting to detect, analyze, and respond to security incidents. While deep expertise in Java or Python isn't required, the ability to investigate and trace incidents to their root cause by analyzing large volumes of logs is crucial. The role involves reviewing logs from various systems—both Windows and Unix—to identify anomalies across the network.