Monitoring SOC Analyst L3

Overview

We are seeking an experienced Monitoring SOC Analyst L3 to join our team for a 12-month remote engagement. The ideal candidate will be responsible for advanced security monitoring, incident analysis, and threat response while supporting a US EST time zone rotational schedule. This role requires expertise in Microsoft security technologies and the ability to work in both Portuguese and English.

Job Description

Key Responsibilities

  • Lead advanced security monitoring and incident response activities within the SOC.

  • Analyze and investigate alerts generated by Sentinel, SIEM, and Defender platforms.

  • Perform in-depth threat analysis, correlation, and triage of security events.

  • Escalate critical incidents and provide remediation guidance to relevant teams.

  • Conduct root cause analysis and generate detailed incident reports.

  • Improve detection use cases, playbooks, and SOC processes.

  • Collaborate with cross-functional teams across global time zones.

  • Ensure compliance with established security policies and procedures.


Requirements

  • 8–10 years of hands-on experience in Security Operations (SOC/L3 level).

  • Strong expertise in Sentinel, SIEM platforms, Microsoft Defender.

  • Ability to work remote and support US EST rotational schedule.

  • Excellent communication skills in Portuguese and English.

  • Advanced knowledge of incident response, monitoring workflows, and threat analysis.

  • Ability to work independently and handle high-severity incidents.

  • Strong analytical, documentation, and reporting skills.

  • Ability to collaborate across multicultural and global teams.

Skills & Requirements

Sentinel, SIEM, Microsoft Defender, Threat Monitoring, Incident Response, Alert Analysis, Root Cause Analysis, Security Reporting, Microsoft Security Stack, Threat Detection, SOC Operations

Apply Now

Join Our Community

Let us know the skills you need and we'll find the best talent for you