
Senior Security Operations Center Analyst
Absolute Security
full-time
Posted on:
Location Type: Remote
Location: Canada
Visit company websiteExplore more
Job Level
About the role
- Monitor and triage alerts from CrowdStrike Falcon and Microsoft Sentinel.
- Lead investigations into endpoint and network security incidents including malware, privilege escalation, lateral movement, and data exfiltration.
- Conduct proactive threat hunts using CrowdStrike telemetry and threat intelligence.
- Perform forensic analysis of compromised systems and malware samples.
- Investigate cloud-based incidents across Azure, AWS, and GCP environments.
- Collaborate with cloud operations teams to improve detection and response capabilities.
- Develop and refine playbooks, runbooks, and standard operating procedures.
Requirements
- 4–7 years of experience in a SOC or cybersecurity analyst role.
- Expert-level proficiency with CrowdStrike Falcon and Microsoft Defender.
- Strong understanding of MITRE ATT&CK, malware behaviors, and incident response.
- Hands-on experience with SIEM platforms (e.g., Splunk, Sentinel, Elastic).
- Deep knowledge of Windows, Linux, and macOS internals.
- Proficiency in scripting (Python, PowerShell) and log analysis.
- Excellent written and verbal communication skills.
Benefits
- Health benefits
- Professional development opportunities
- Flexible work arrangements
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
CrowdStrike FalconMicrosoft Sentinelmalware analysisincident responsethreat huntingforensic analysisscriptinglog analysisWindows internalsLinux internals
Soft Skills
communication