Info Security Specialist III (SIEM/SOAR focused) - Remote
IT & Digital/IT
LHH
$50.00 - $75.00 per Hour
Chicago, IllinoisContractor
IT
IT & Digital
LHH is working with a client based in the Chicago Loop that is looking to hire a Information Security Analyst who has a strong background in SIEM and/or SOAR to join our client’s staff for a 6+ month project. The role will be 100% remote.
Candidates MUST be willing to work as a w2 employee of LHH to be considered. No C2C at this time.
SOC L3 Analyst 1st shift hours from 9am-5:45pm CT. Occasional work on holidays/weekends may be needed
Location: Fully remote Individual contributor for First shift focused on proactively finding adversary activities in the network with the goal of discovery before they complete their mission. The ideal candidate would have skills and experience in log analysis, network traffic analysis, and MITRE attack framework.
Part of the global IT security team working closely with the US SOCs teams. Performs a combination of duties in accordance with departmental guidelines. Conduct real-time and historical analysis using the full security suite owned by CNA including Endpoint Protection, SIEM, Firewall, Endpoint Detection & Response, Intrusion Detection Systems, Email Gateway, Web Content Filtering, Network Detection & Response, & Identity Management technology. Conduct incident response triage analysis on suspected hosts to determine potential ongoing attacks and its scope. Conduct analysis review of junior staff for quality control; mentor junior staff to encourage career growth and development. Stay on top of latest attacker tactics, techniques and procedure to discover sophisticated threats in the network. Collaborate with SOC, Intelligence, Incident Response and Enterprise Security Teams for incident investigations and hunt missions when possible. Identify visibility gaps in the network and recommend solutions. Develop, maintain and update playbooks, process, and detection capabilities based on real-time feedback from investigations. Coordinate escalation for advance forensics, malware reverse-engineering, and additional host review tasks to third party vendors. Articulate security incident details to business stakeholders and non-technical individuals. May perform additional duties as assigned
Skills: Familiarity with SOC operations, scheduling, and tools including SIEM, SOAR, and DFIR products. Knowledge of the incident response lifecycle and cyber security leading practices. Solid understanding of security policy construction and publication. In-depth knowledge of regulations (i.e., SOX, privacy, etc.) and internal controls as they apply to IT. Ability to influence change in corporate understanding and adoption of information security concepts. Proven solid analytical and problem solving skills. Excellent communications and interpersonal skills and the ability to work effectively with peers, IT management and staff, and internal/external business partners/clients. Ability to manage various technical projects to completion. Advanced computer skills including Microsoft Office suite and other business related software systems. Other technologies will apply dependent on business area supported. Preferred insurance industry knowledge.
Education: Typically a minimum of five years of technical experience in the security aspects of multiple platforms, operating systems, software, communications and network protocols or an equivalent combination. Industry certifications preferred (CISSP, GCFA, GCIH, GCFE, or equivalent) or related discipline, or equivalent experience in Computer Science.
Pay Details: $50.00 to $75.00 per hour
Search managed by: Maricel Quianzon
Benefit offerings available for our associates include medical, dental, vision, life insurance, short-term disability, additional voluntary benefits, EAP program, commuter benefits and a 401K plan. Our benefit offerings provide employees the flexibility to choose the type of coverage that meets their individual needs. In addition, our associates may be eligible for paid leave including Paid Sick Leave or any other paid leave required by Federal, State, or local law, as well as Holiday pay where applicable.
Equal Opportunity Employer/Veterans/Disabled
To read our Candidate Privacy Information Statement, which explains how we will use your information, please navigate to https://www.lhh.com/us/en/candidate-privacy
The Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable:
- The California Fair Chance Act
- Los Angeles City Fair Chance Ordinance
- Los Angeles County Fair Chance Ordinance for Employers
- San Francisco Fair Chance Ordinance
Info Security Specialist III (SIEM/SOAR focused) - Remote
IT & Digital/IT
LHH
$50.00 - $75.00 per Hour
Chicago, IllinoisContractor
IT
IT & Digital
LHH is working with a client based in the Chicago Loop that is looking to hire a Information Security Analyst who has a strong background in SIEM and/or SOAR to join our client’s staff for a 6+ month project. The role will be 100% remote.
Candidates MUST be willing to work as a w2 employee of LHH to be considered. No C2C at this time.
SOC L3 Analyst 1st shift hours from 9am-5:45pm CT. Occasional work on holidays/weekends may be needed
Location: Fully remote Individual contributor for First shift focused on proactively finding adversary activities in the network with the goal of discovery before they complete their mission. The ideal candidate would have skills and experience in log analysis, network traffic analysis, and MITRE attack framework.
Part of the global IT security team working closely with the US SOCs teams. Performs a combination of duties in accordance with departmental guidelines. Conduct real-time and historical analysis using the full security suite owned by CNA including Endpoint Protection, SIEM, Firewall, Endpoint Detection & Response, Intrusion Detection Systems, Email Gateway, Web Content Filtering, Network Detection & Response, & Identity Management technology. Conduct incident response triage analysis on suspected hosts to determine potential ongoing attacks and its scope. Conduct analysis review of junior staff for quality control; mentor junior staff to encourage career growth and development. Stay on top of latest attacker tactics, techniques and procedure to discover sophisticated threats in the network. Collaborate with SOC, Intelligence, Incident Response and Enterprise Security Teams for incident investigations and hunt missions when possible. Identify visibility gaps in the network and recommend solutions. Develop, maintain and update playbooks, process, and detection capabilities based on real-time feedback from investigations. Coordinate escalation for advance forensics, malware reverse-engineering, and additional host review tasks to third party vendors. Articulate security incident details to business stakeholders and non-technical individuals. May perform additional duties as assigned
Skills: Familiarity with SOC operations, scheduling, and tools including SIEM, SOAR, and DFIR products. Knowledge of the incident response lifecycle and cyber security leading practices. Solid understanding of security policy construction and publication. In-depth knowledge of regulations (i.e., SOX, privacy, etc.) and internal controls as they apply to IT. Ability to influence change in corporate understanding and adoption of information security concepts. Proven solid analytical and problem solving skills. Excellent communications and interpersonal skills and the ability to work effectively with peers, IT management and staff, and internal/external business partners/clients. Ability to manage various technical projects to completion. Advanced computer skills including Microsoft Office suite and other business related software systems. Other technologies will apply dependent on business area supported. Preferred insurance industry knowledge.
Education: Typically a minimum of five years of technical experience in the security aspects of multiple platforms, operating systems, software, communications and network protocols or an equivalent combination. Industry certifications preferred (CISSP, GCFA, GCIH, GCFE, or equivalent) or related discipline, or equivalent experience in Computer Science.
Pay Details: $50.00 to $75.00 per hour
Search managed by: Maricel Quianzon
Benefit offerings available for our associates include medical, dental, vision, life insurance, short-term disability, additional voluntary benefits, EAP program, commuter benefits and a 401K plan. Our benefit offerings provide employees the flexibility to choose the type of coverage that meets their individual needs. In addition, our associates may be eligible for paid leave including Paid Sick Leave or any other paid leave required by Federal, State, or local law, as well as Holiday pay where applicable.
Equal Opportunity Employer/Veterans/Disabled
To read our Candidate Privacy Information Statement, which explains how we will use your information, please navigate to https://www.lhh.com/us/en/candidate-privacy
The Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable:
- The California Fair Chance Act
- Los Angeles City Fair Chance Ordinance
- Los Angeles County Fair Chance Ordinance for Employers
- San Francisco Fair Chance Ordinance