Search

L3 Incident Response Engineer (SOC)

PRI Technology
locationAustin, TX, USA
PublishedPublished: 6/14/2022
Full Time

Job Description

Job Description

I have a full time opportunity for an enterprise organization for an L3 Cybersecurity Engineer to join the team. This is a 70,000+ person organization with a lot of room for growth. It reports directly into the Monitoring & Cyber Response Manager.

It is 3 days onsite in the Austin TX office.

Salary $170-$205k + bonus

Responsibilities:

  • Monitor and analyze security alerts from SIEM, EDR, and other security platforms to identify potential threats.
  • Perform in-depth investigation of suspicious activity, correlating data across multiple sources to determine scope and impact.
  • Lead the resolution of low to moderately complex security incidents, including containment, eradication, and recovery actions.
  • Support containment and remediation efforts during active incidents.
  • Conduct initial root cause analysis and contribute to post-incident reviews to identify gaps and improve future response efforts.
  • Leverage threat intelligence, behavioral analytics, and contextual data to enhance detection, investigation, and resolution capabilities.
  • Collaborate with detection engineering teams to develop, test, and tune detection rules and use cases.
  • Perform basic malware analysis, log correlation, and network traffic inspection to support incident resolution.
  • Maintain up-to-date knowledge of the threat landscape, including attacker tactics, techniques, and procedures (TTPs), and apply this knowledge to improve incident handling.
  • Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate incident resolution efforts.
  • Document investigation steps, findings, and resolution actions in a clear, structured, and timely manner.
  • Participate in SOC shift rotations to ensure 24/7 monitoring and rapid response to security events.
  • Contribute to the continuous improvement of SOC processes, playbooks, and knowledge base, with a focus on enhancing incident resolution workflows

Qualifications:

  • Bachelor’s degree in Cybersecurity, Information Technology, or Computer Science (completed and verified prior to start)
  • Solid experience in a SOC or cybersecurity operations
  • Effective communicator with the ability to document investigations and collaborate with cross-functional teams
  • Certifications such as CompTIA Security+, CySA+, or GCIH
  • Proficiency in analyzing alerts from SIEM, EDR, and network monitoring tools
  • Familiarity with threat intelligence, basic malware analysis, and log correlation techniques
  • Understanding of common attack vectors, threat actor behaviors, and frameworks like MITRE ATT&CK
  • Strong analytical and problem-solving skills with attention to detail
  • Experienced in triaging and investigating security alerts across SIEM, EDR, and network platforms • Skilled in correlating data from multiple sources to identify and escalate confirmed threats
  • Proficient in supporting incident response efforts and conducting initial root cause analysis
  • Strong understanding of threat intelligence and its application in operational workflows
  • Effective communicator with the ability to document investigations clearly and collaborate across teams
  • Committed to continuous learning and development in threat detection and response
  • Analytical thinker with a proactive approach to identifying and mitigating risks
  • Reliable team player in a 24/7 SOC environment, contributing to operational excellence

Lori Sklarski

Senior Technical Recruiter, PRI Technology

Lori.sklarski@pritechnology.com

Direct:(973)-354-2797

Office: 973.732.5454 x27

Cell: 973.432.9968

www.pritechnology.com

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...