We are seeking a highly experienced Level 3 SOC Analyst with a strong background in insider threat detection to join a dynamic security operations team. This hybrid role will support traditional SOC activities while also acting as a deployable resource for insider threat investigations. The ideal candidate will have a deep understanding of detection engineering, data loss prevention (DLP) techniques, and a strong command of tools used for identifying and containing internal threats in large enterprise environments.

Must Haves: 

  • 5+ years of hands-on experience in a Security Operations Center (SOC) environment, with at least 2 years at a Level 3 or senior analyst level.

  • Experience working on or with Insider Threat or Corporate Investigations teams in a large enterprise setting.

  • Strong background in Detection Engineering, including writing and tuning detection rules across SIEM and EDR platforms.

  • Expertise with DLP and SIEM tools (e.g., Splunk, Sentinel, Exabeam, QRadar).

  • Familiarity with threat hunting techniques and behavioral analysis.

  • Experience with incident response and digital forensics in insider threat cases.

Preferred/Helpful Tools & Technologies:

  • Microsoft Purview (formerly known for compliance, insider risk management, and DLP)

  • Mimecast (Admin experience preferred, not just end-user)

  • Experience with enterprise monitoring tools and asset management platforms.

  • Knowledge of email monitoring, endpoint data tracking, and behavioral analytics.

  • Work with stakeholders across InfoSec, HR, Legal, and Ethics on sensitive investigations.

Apply Back to Results

Apply Now

Please ensure all fields have been filled.

Your Information

Share your resume*

Please note only files with .pdf, .docx or .doc file extensions are accepted.

Max file size: 512KB.

Please attach your resume, ensure it is in the correct format and smaller than 512KB.

×