We are seeking an experienced Monitoring SOC Analyst L3 to join our team for a 12-month remote engagement. The ideal candidate will be responsible for advanced security monitoring, incident analysis, and threat response while supporting a US EST time zone rotational schedule. This role requires expertise in Microsoft security technologies and the ability to work in both Portuguese and English.
Lead advanced security monitoring and incident response activities within the SOC.
Analyze and investigate alerts generated by Sentinel, SIEM, and Defender platforms.
Perform in-depth threat analysis, correlation, and triage of security events.
Escalate critical incidents and provide remediation guidance to relevant teams.
Conduct root cause analysis and generate detailed incident reports.
Improve detection use cases, playbooks, and SOC processes.
Collaborate with cross-functional teams across global time zones.
Ensure compliance with established security policies and procedures.
8–10 years of hands-on experience in Security Operations (SOC/L3 level).
Strong expertise in Sentinel, SIEM platforms, Microsoft Defender.
Ability to work remote and support US EST rotational schedule.
Excellent communication skills in Portuguese and English.
Advanced knowledge of incident response, monitoring workflows, and threat analysis.
Ability to work independently and handle high-severity incidents.
Strong analytical, documentation, and reporting skills.
Ability to collaborate across multicultural and global teams.
Sentinel, SIEM, Microsoft Defender, Threat Monitoring, Incident Response, Alert Analysis, Root Cause Analysis, Security Reporting, Microsoft Security Stack, Threat Detection, SOC Operations