What are the responsibilities and job description for the Lead SOC Analyst- W2 Only position at Jobs via Dice?
Dice is the leading career destination for tech experts at every stage of their careers. Our client, NGTalentTech Group LLC, is seeking the following. Apply via Dice today!
Responsibilities:
Responsibilities:
- Lead advanced security event investigation and incident triage, including IOC validation, deep dive intrusion analysis, event correlation, forensic review, and determining when events meet incident thresholds to engage Incident Response
- Oversee and mentor Level 1 Analysts, ensuring quality, consistency, and timely execution of SOC processes, shift metrics, and event handling across SIEM portals.
- Collaborate closely with MDR Analysts on incident workflows, supporting detection, response, remediation activities, and cross team communication to drive proper incident resolution
- Optimize SOC technology by creating and tuning SIEM filters, dashboards, monitors, and collaborating with SIEM Engineers to refine alert logic and improve correlation performance
- Conduct proactive threat hunting, threat research, and leverage internal/external intelligence sources to enhance event enrichment, detection capability, and overall SOC maturity
- Troubleshoot and support IDS/IPS, firewalls, and security monitoring tools to resolve issues impacting detection quality, performance, or incident visibility
- Act with integrity, professionalism, and personal responsibility to uphold KPMG''s respectful and courteous work environment
- Minimum three years of recent technical experience in Information Security, System Administration, or Network Engineering, including experience in Information Security and MDR/SOC/Incident Response experience.
- Bachelor''s degree from an accredited college/university in Computer Science, Engineering, Information Technology, Cybersecurity, or a related field is required
- Strong knowledge of network security fundamentals, intrusion detection, incident detection/response, malware analysis, cyber forensics, SIEM concepts, and security best practices
- Proven hands on experience with scripting (PowerShell, Bash, Perl, Tcl, Lua), programming (C/C , C#, Python, JavaScript, .NET), packet analysis tools, and common security platforms (Google SecOps, MS Sentinel, CrowdStrike, Splunk, Qradar, LogRhythm, SolarWinds)
- Demonstrated communication, analytical, client facing and problem solving skills, with the ability to operate effectively in fast paced environments, off hours (nights/weekends/holidays), and shifting priorities
- Experience with IDS/IPS, firewalls (Snort, Cisco, Fortigate, Sourcefire), Windows and Unix based systems, LAN/WAN technologies, TCP/IP, OSI model, penetration testing tools (Metasploit, Nmap, Kali), and incident response workflows
- Ability to travel as required