What are the responsibilities and job description for the Contract Senior Security Analyst / SOC Lead position at Carex Consulting Group?
W2 only, no C2C, must be authorized to work in the US (both now and in the future).
Contract Senior Security Analyst / SOC Lead (Contract) - Remote in Madison, Wisconsin. Apply now for this opportunity at Carex!
Carex is partnering with a client partner in the financial services industry to hire a contract Senior Security Analyst / SOC Lead to serve as a subject matter expert in security event triage, incident response, and proactive threat analysis. This role will take ownership of advanced incident investigations, optimize core security tooling, and play a leadership role within the security operations team. This role is a 6-month contract role.
What You’ll Do
Contract Senior Security Analyst / SOC Lead (Contract) - Remote in Madison, Wisconsin. Apply now for this opportunity at Carex!
Carex is partnering with a client partner in the financial services industry to hire a contract Senior Security Analyst / SOC Lead to serve as a subject matter expert in security event triage, incident response, and proactive threat analysis. This role will take ownership of advanced incident investigations, optimize core security tooling, and play a leadership role within the security operations team. This role is a 6-month contract role.
What You’ll Do
- Lead the analysis and resolution of complex security events and incidents, including triage and coordinated incident response efforts.
- Manage and optimize the organization’s Endpoint Detection and Response (EDR) solutions to strengthen threat visibility and containment capabilities.
- Conduct proactive threat hunting, phishing analysis, and deep-dive investigations to identify and mitigate risks.
- Perform advanced SIEM searches using tools such as Elasticsearch to uncover anomalous or malicious activity.
- Support ongoing vulnerability management, remediation guidance, and related security initiatives.
- Collaborate across teams on data loss prevention strategies, email security enhancements, and incident readiness.
- Contribute to and lead documentation efforts such as playbooks and runbooks to support SOC process maturity.
- Provide guidance and mentorship to team members, supporting a culture of continuous learning and operational excellence.
- 10 years of experience in security operations or related IT roles, with demonstrated depth in incident response and threat analysis.
- Proficiency with key security tools, including:
- CrowdStrike (EDR)
- Zscaler (SASE/CASB)
- Elasticsearch (SIEM)
- Tenable One (Vulnerability Management)
- Cyberhaven (Data Loss Prevention)
- Abnormal (Email Security)
- Familiarity with Microsoft 365 and Azure cloud environments.
- Strong leadership and mentoring capabilities, with the confidence to guide junior analysts and influence cross-functional teams.
- A proactive, solution-focused mindset with the ability to work independently in high-stakes scenarios.