CrawlJobs Logo

L3 SOC Analyst

https://www.hpe.com/ Logo

Hewlett Packard Enterprise

Location Icon

Location:
Ireland , Galway

Category Icon

Job Type Icon

Contract Type:
Employment contract

Salary Icon

Salary:

Not provided

Job Description:

Managed Services Security team are made up of teams that provide remote (offsite) service; customer access, pre-sales, post-sales, and service delivery. Technical teams focus is to solve various business systems and applications problems for customers, onsite engineering personnel and Authorized Service Providers on standard, specialized or complex systems.

Job Responsibility:

  • Monitor work queues for new escalations from the L1/L2 team
  • Triage cases when there are multiple escalations in the queue
  • Perform deep-dive analysis on escalated cases
  • Uses Threat intelligence and IOA/IOC data to identify source and impact of attack
  • Clearly document your investigations as they progress and regularly add case notes to the case to maintain situational awareness
  • Complete the investigations and recommend remediations for low and medium severity security incidents
  • Initiate a war room for confirmed or suspected critical security incidents and follow the documented incident response plan
  • Complete Post Incident Review (PIR) documentation for all medium and higher severity security incidents
  • Monitor work queues for new cases requiring review
  • Triage case reviews as required
  • Review cases completed by L1 analysts for quality, accuracy, and completeness
  • Immediately investigate any you suspect to be true security incident falsely closed in L1/L2
  • Provide feedback, guidance and mentoring to L1/L2 analysts where appropriate to improve their initial investigation skills
  • Recommend exceptions or changes to detection rules to reduce false-positive detection
  • Time permitting, perform proactive reviews of open and acknowledged events currently being triaged by the L1 team
  • Assist the peer L3 team in scheduled threat hunting activities
  • Develop queries or other methods for detecting new or previously undetected exploits, tactics, and techniques. Work with the Engineering team to implement these detections
  • Maintain situational awareness
  • Actively participate in end-of-shift handovers of ongoing and recently closed investigations
  • Keeping meticulous notes of investigations of confirmed and suspected security incidents
  • Reviewing vulnerability scan data for all customer sites monthly, and being aware of any areas of additional risk (accepted or new) to the organisation
  • Develop and update playbooks, KB articles and training material as appropriate
  • Review documentation created by L1/L2 analysts for completeness and accuracy

Requirements:

  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field or equivalent experience desired
  • Generally, 5+ years in SOC, Incident Response, or Threat Analysis roles
  • Strong knowledge & understanding of common attack vectors and threat actor tactics, techniques, and procedures
  • Knowledge of Elastic SIEM is preferred. If not experience on any of the other SIEM tools like Sentinel, Splunk, QRadar, LogRhythm
  • Relevant industry qualification where applicable
  • Excellent verbal and written communication skills in language to be supported
  • Advanced troubleshooting skills in a technical environment
  • Excellent analytical and problem solving skills
  • Advanced Software and hardware knowledge of computing, storage and peripheral devices
  • Specific knowledge and training with the company's products. Knowledge of multiple product lines (for example, proactive, reactive, storage, enterprise systems, tier 2 or 3 support, etc.)
  • Advanced proficiency with case management databases and tools
  • Superior customer service skills
  • Phone and remote support experience. E-support experience, knowledge and resolution ability
  • Ability to solve and document solutions for usage of other technicians and customers
  • Ability to mentor new agents
  • Ability train peers on solutions
  • Ability to take full ownership for resolution with escalated customers
  • Ability to lead technical action plans
  • Lead or provide expertise to teams or projects
  • Highly Developed knowledge of more complex solutions
What we offer:
  • Health & Wellbeing
  • Personal & Professional Development
  • Unconditional Inclusion

Additional Information:

Job Posted:
May 05, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for L3 SOC Analyst

L3 Security Analyst

Join Vodafone’s Cyber Defence Operations Center of Excellence (CDO) and play a p...
Location
Location
United Kingdom , Newbury
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experienced SOC analyst (Level 2 or above) with at least 4 years in security event analysis and incident response
  • Strong technical knowledge of networking protocols, operating systems (Windows/Linux), and security technologies (SIEM, EDR, IDS/IPS, firewalls, proxies)
  • Hands-on experience with SIEM tuning and SOAR automation
  • Familiarity with frameworks like MITRE ATT&CK and cyber kill chain
  • Knowledge of cloud platforms (Azure, AWS, Google Cloud) and scripting/programming skills
  • Excellent analytical, communication, and collaboration skills, with the ability to explain technical concepts to non-technical audiences
  • Passion for continuous learning and professional development, ideally working toward certifications such as GCIA, GCIH, GCFA, GNFA, CEH, or ECSA
  • A proactive, disciplined approach and the ability to work independently or as part of a team in a fast-paced environment
Job Responsibility
Job Responsibility
  • Investigate and validate threats using cutting-edge tools
  • Collaborate with global teams on incident investigations
  • Mentor colleagues to uplift skills across the CSOC
  • Fine-tuning SIEM systems and automating response actions
  • Delivering insightful security reports and advisories
What we offer
What we offer
  • Yearly bonus: 10%
  • Annual leave: 28 days + bank holidays + the opportunity to buy/sell/carry over 5 days/year
  • Charity days: 5 days/year
  • Maternity leave: 52 weeks: the first 13 weeks are fully paid, followed by 26 weeks of half pay
  • Private pension: You can contribute up to 5% of your basic pay with 2:1 matching from Vodafone up to 10%
  • Access to: private medical, private dental, free health assessments, share save scheme
  • Additional discounts: Vodafone retail, gym, cinema, cycle to work, season ticket loan
Read More
Arrow Right

SOC Analyst L3

The primary function of the Tier 3 Analyst is to enhance our security operations...
Location
Location
Belgium , Diegem
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 3 to 5 years of experience in the IT security industry, preferably working in a SOC/NOC environment
  • Hands-on experience with at least two of the following: Splunk, IBM QRadar, Microsoft Defender for Endpoint, Microsoft Sentinel, Google Chronicle
  • Strong knowledge of log formats, parsing, and normalization
  • Experience with KQL, SPL, AQL, or other SIEM query languages
  • Familiarity with scripting (Python, PowerShell) for automation and enrichment
  • Deep understanding of threat detection, incident response, and cyber kill chain
  • Familiarity with MITRE ATT&CK, NIST, and CIS frameworks
  • Strong verbal and written English communication
  • Strong interpersonal and presentation skills
  • Strong analytical skills
Job Responsibility
Job Responsibility
  • Deploy, configure, and maintain SIEM platforms (Splunk, QRadar, Sentinel, Defender, Chronicle)
  • Onboard and normalize log sources across cloud and on-prem environments
  • Develop and optimize analytical rules for threat detection, anomaly detection, and behavioural analysis
  • Design and implement incident response playbooks for various threat scenarios (e.g., phishing, lateral movement, data exfiltration)
  • Integrate playbooks with SOAR platforms (e.g., Microsoft Logic Apps, XSOAR) to automate triage and response
  • Continuously refine playbooks based on threat intelligence and incident feedback
  • Monitor and analyse security alerts and events to identify potential threats
  • Perform in-depth investigations and coordinate incident response activities
  • Collaborate with threat intelligence teams to enrich detection logic
  • Conduct threat modelling exercises using frameworks like MITRE ATT&CK, STRIDE, or Kill Chain
  • Fulltime
Read More
Arrow Right

Security Consultant L3

We are looking for an experienced security professional for our 24×7 managed sec...
Location
Location
India , Mumbai / New Delhi
Salary
Salary:
Not provided
binaryglobal.com Logo
Binary Global
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • BE/MCA or University degree
  • At least 6-10 years of experience working in a SOC environment
  • Certifications required – CEH, ECIH/CHFI
  • Knowledge & hands-on experience in the management of IDS/IPS
  • Firewalls, VPN, and other network & security products
  • Experience in security Information event management (SIEM) tools such as Qradar, Arcsight, Logrhythm or any other tools
  • Creating basic & advanced co-relation rules
  • Should have expertise in TCP/IP network traffic and event log analysis
  • Knowledge of ITIL disciplines such as Incident, Problem and Change Management
  • In-depth knowledge of OSI Layers, Internet Protocol, TCP/IP
Job Responsibility
Job Responsibility
  • Review & Analyse security events for quality and possible escalations to raise the alarm
  • Follow-up with customers & vendors to resolve open issues
  • Security device administration with respect to tuning and enhancing detection capabilities
  • Handling SOC MDR Operational requirements
  • Review and present security reports and ensure compliance to security policies and SLAs as applicable
  • Perform in-depth analysis of events and logs for detecting malicious applications and network activity, common attack techniques that compromise hosts, detecting and analysing system and network vulnerabilities and continuous process improvement by discovering the root causes of incidents
  • Work to resolve major security incidents in conjunction with respective resolver groups
  • Experience configuring security incident and event management tools including creating event filtering and correlation rules and reports
  • Ability to work with customer and product specialists to weed out false positives and improve the efficiency of the security operations
  • Creation of knowledge base which will be used by SOC analysts for performing their roles
  • Fulltime
Read More
Arrow Right

Security Specialist Engineer

At Mobile Financial Services we enable financial inclusion - truly using Technol...
Location
Location
India , Noida
Salary
Salary:
Not provided
ericsson.com Logo
Ericsson
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in Software Engineering or similar
  • Solid Linux handling knowledge in Kubernetes environment
  • Experience in Cloud/SAAS Operational Security Management, AWS will be preferred
  • Experience in container technologies e.g. Docker/Kubernetes
  • Minimum of 5 years of experience in the IT security industry, preferably working in a SOC/NOC environment
  • Better understanding of SSL/TLS
  • Better understanding of Vulnerability assessment and Management
  • Better understanding of Public Key Infrastructure
  • Working knowledge of TCP/IP and networking concepts
  • Better understanding of Certificate Management
Job Responsibility
Job Responsibility
  • Perform advanced triage and investigation of escalated security incidents from L2 and L3 analysts
  • Conduct threat hunting activities using SIEM, EDR, and network security tools
  • Correlate logs from multiple sources (firewalls, IDS/IPS, endpoints, cloud, email gateways)
  • Develop fine-tune detection rules and use cases in SIEM platforms
  • Analyze malware behavior and suspicious artifacts
  • Coordinate containment, eradication, and recovery actions during incidents
  • Review risky user behavior (impossible travel, abnormal downloads, privilege escalation)
  • Manage access controls, conditional access policies, and MFA enforcement
  • Security configuration reviews and hardening of cloud resources (VMs, storage, databases, Kubernetes, serverless)
  • Support Cloud Security Posture Management (CSPM) tools by investigating misconfigurations and policy violations
  • Fulltime
Read More
Arrow Right

Senior Incident Response Analyst

Wrike is seeking an experienced Senior Incident Response Analyst to help safegua...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
klaxoon.com Logo
Klaxoon
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Over 5 years of experience in a Senior Incident Response Analyst/SOC/Cybersecurity or similar security-focused role in a software product company
  • Deep understanding of network fundamentals and a wide range of security threats
  • Exceptional analytical and problem-solving skills, with the ability to think critically under pressure
  • Outstanding communication skills, both written and verbal, with the ability to convey complex concepts to technical and non-technical audiences
  • Hands-on experience with leading security information event management (SIEM) and extended detection and response (XDR) platforms (e.g., Rapid7, Splunk, Wazuh, Microsoft Defender for Endpoint, Crowdstrike)
  • Strong experience in log analysis, event correlation, and incident response
Job Responsibility
Job Responsibility
  • Lead the monitoring, analysis, and triage of complex security alerts and events, providing expert guidance to junior team members
  • Assess risk and impact of potential incidents, recommending and overseeing appropriate remediation actions
  • Employ a broad range of advanced security tools and technologies to proactively detect and investigate sophisticated cyber threats
  • Collaborate with and mentor other teams, including incident responders, to ensure timely and accurate escalation and resolution of high-priority cases
  • Oversee documentation and reporting of security incidents, ensuring accuracy, clarity, and timely delivery to relevant stakeholders
  • Drive the ongoing development and enhancement of security monitoring and detection capabilities, introducing best practices and automation where appropriate
  • Stay ahead of the latest security trends, emerging vulnerabilities, and best practices, sharing knowledge and recommendations within the team and across the organization
  • Demonstrated experience functioning at an L3 level, serving as the final escalation point for resolving complex security incidents and issues
  • Mentorship of junior/mid senior analysts, ability to share knowledge
What we offer
What we offer
  • 18 calendar days of paid vacation (12 days of National & Festival holidays (10 fixed, 2 flexible))
  • Sick Leave Compensation (5 Paid Uncertified Sick Days)
  • Menstrual Leave: Twelve (12) days per calendar year. Women employees are eligible for up to 1 day of menstrual leave per month.
  • Parental Leave: 26 Weeks Maternity / 4 Week Paternity
  • 2 Volunteer Days
  • Group Medical Insurance (Employees + Dependents)
  • Term Life Insurance (Rs 50,00,000)
  • Personal Accident Insurance (Rs 50,00,000)
  • Monthly Broadband / Internet Reimbursement (INR 1500)
  • Hybrid Working Model + Complimentary Lunch & Snacks
  • Fulltime
Read More
Arrow Right
New

Guest Experience Supervisor (Executive Lounge)

Process all guest check-ins, verifying guest identity, form of payment, assignin...
Location
Location
Malaysia , Kuala Lumpur
Salary
Salary:
Not provided
https://www.marriott.com Logo
Marriott Bonvoy
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • High school diploma or G.E.D. equivalent
  • At least 1 year of related work experience
  • At least 1 year of supervisory experience
Job Responsibility
Job Responsibility
  • Process all guest check-ins, verifying guest identity, form of payment, assigning room, and activating/issuing room key
  • Set up accurate accounts for each guest according to their requirements
  • Enter Marriott Rewards information
  • Ensure rates match market codes, document exceptions
  • Secure payment prior to issuing room key, verify/adjust billing
  • Compile and review daily reports/logs/contingency lists
  • Complete cashier and closing reports
  • Supply guests with directions and property information
  • Accommodate guest requests, contacting appropriate staff if necessary
  • Follow up to ensure requests have been met
  • Fulltime
Read More
Arrow Right
New

Director of Product, Core Markets

Location
Location
Turkey
Salary
Salary:
Not provided
fundraiseup.com Logo
Fundraise Up
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10+ years in Product Management, with 3+ years leading PMs (managing managers or multiple PMs across areas). Enterprise B2B experience (SaaS/fintech/payments/e-commerce or adjacent), including pre-sales/RFPs and complex stakeholder management. Proven discovery & execution track record: from insight → business case → delivery → measurable impact. Metrics fluency: ARR, NRR, win-rate, conversion, adoption, time-to-value
  • strong analytical and decision-making skills. Communication: C1/C2 English—clear, confident, and persuasive with executives and cross-functional teams. Travel-ready: comfortable with regular customer visits and conferences (including the U.S.)
Job Responsibility
Job Responsibility
  • Develop deep expertise in Core Markets — understand segments, buying behaviors, procurement and RFP patterns, compliance requirements, and the key barriers to adoption
  • drive continuous discovery — conduct executive interviews, site visits, and industry events, translating insights into clear 'must-haves' versus differentiators for each vertical
  • own strategic enterprise deals — present the product vision, address objections, and collaborate with the Go-to-Market team to co-create scalable, enterprise-grade rollout plans
  • define and own the Core Markets strategy and multi-quarter roadmap across verticals
  • articulate crisp bets with quantified business cases
  • balance scale vs. customization
  • set and deliver against OKRs that tie directly to revenue and adoption (ARR growth, win-rate, NRR, adoption of key capabilities)
  • hire, mentor, and inspire 2–5 PMs (vertical leads)
  • establish operating rituals
  • grow leaders
What we offer
What we offer
  • 31 days off
  • 100% paid telemedicine plan
  • Home Office Setup Assistance (office chair, office desk, monitor)
  • English learning courses
  • relevant professional education
  • gym or swimming pool
  • co-working
  • remote working
  • Fulltime
Read More
Arrow Right
New

Teller 20 Hours (Spanish Desired) Cutten

Wells Fargo is seeking a Teller in our Consumer Banking and Lending division, as...
Location
Location
United States , Houston
Salary
Salary:
Not provided
https://www.wellsfargo.com/ Logo
Wells Fargo
Expiration Date
May 10, 2026
Flip Icon
Requirements
Requirements
  • 6+ months of interacting with customers experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
Job Responsibility
Job Responsibility
  • Support customer engagement by processing teller transactions, sharing digital solutions, and making appropriate introductions to bankers
  • Complete operational activities while minimizing risks under established policies
  • Perform routine transactional, operational, and customer support tasks efficiently through knowledge of bank procedures and products, as well as partners across the organization
  • Receive direction from managers and exercises judgment within defined policies and procedures
  • Escalate questions and issues to more experienced roles
  • Interact with customers and individuals to demonstrate care, build relationships, and complete requested transactions
  • Identify information and services to meet customers financial needs
What we offer
What we offer
  • Robust benefits
  • competitive compensation
  • programs designed to help you find work-life balance and well-being
  • rewarded for investing in your community
  • celebrated for being your authentic self
  • empowered to grow
  • Parttime
!
Read More
Arrow Right