
SOC Engineer
Randstad Digital Americas, Chandler, AZ, United States
Responsibilities
Alert Triage: Monitor SIEM platforms to identify and prioritize potential security incidents. You will be the first line of defense in determining the severity and scope of incoming threats.
Incident Investigation: Utilize SIEM tools (Splunk preferred) to perform deep‑dive investigations into system logs to identify root causes of anomalies.
Network Analysis: Read and analyze packet captures (pcaps) to investigate network‑level threats and unusual traffic patterns.
Endpoint Monitoring: Leverage EDR tools (CrowdStrike preferred) to manage endpoint security and investigate potential host‑based threats.
Detailed Documentation: Maintain high standards for reporting, ensuring that every investigation is documented clearly for team visibility and future remediation.
Collaborative Response: Work closely with the Information Security Associate Leader and peer analysts to resolve complex, fast‑moving security issues in real‑time.
Qualifications
Bachelor's degree.
Experience in incident response, SIEM, network packet analysis, and endpoint detection and response is preferred.
Experience with Splunk and CrowdStrike is preferred.
Location
Chandler, Arizona
Job Type
Contract to Perm
Work Hours
9am to 5pm
Equal Opportunity Employer
Race, Color, Religion, Sex, Sexual Orientation, Gender Identity, National Origin, Age, Genetic Information, Disability, Protected Veteran Status, or any other legally protected group status.
Accommodations
At Randstad Digital, we welcome people of all abilities and want to ensure that our hiring and interview process meets the needs of all applicants. If you require a reasonable accommodation to make your application or interview experience a great one, please contact HRsupport@randstadusa.com.
Benefits
Medical, prescription, dental, vision, AD&D, and life insurance offerings, short‑term disability, and a 401(k) plan (all benefits are based on eligibility).
Posting Duration
This posting is open for thirty (30) days.
#J-18808-Ljbffr
Alert Triage: Monitor SIEM platforms to identify and prioritize potential security incidents. You will be the first line of defense in determining the severity and scope of incoming threats.
Incident Investigation: Utilize SIEM tools (Splunk preferred) to perform deep‑dive investigations into system logs to identify root causes of anomalies.
Network Analysis: Read and analyze packet captures (pcaps) to investigate network‑level threats and unusual traffic patterns.
Endpoint Monitoring: Leverage EDR tools (CrowdStrike preferred) to manage endpoint security and investigate potential host‑based threats.
Detailed Documentation: Maintain high standards for reporting, ensuring that every investigation is documented clearly for team visibility and future remediation.
Collaborative Response: Work closely with the Information Security Associate Leader and peer analysts to resolve complex, fast‑moving security issues in real‑time.
Qualifications
Bachelor's degree.
Experience in incident response, SIEM, network packet analysis, and endpoint detection and response is preferred.
Experience with Splunk and CrowdStrike is preferred.
Location
Chandler, Arizona
Job Type
Contract to Perm
Work Hours
9am to 5pm
Equal Opportunity Employer
Race, Color, Religion, Sex, Sexual Orientation, Gender Identity, National Origin, Age, Genetic Information, Disability, Protected Veteran Status, or any other legally protected group status.
Accommodations
At Randstad Digital, we welcome people of all abilities and want to ensure that our hiring and interview process meets the needs of all applicants. If you require a reasonable accommodation to make your application or interview experience a great one, please contact HRsupport@randstadusa.com.
Benefits
Medical, prescription, dental, vision, AD&D, and life insurance offerings, short‑term disability, and a 401(k) plan (all benefits are based on eligibility).
Posting Duration
This posting is open for thirty (30) days.
#J-18808-Ljbffr