- Company Name
- Ledgent Technology
- Job Title
- SOC Analyst III, Digital Forensics & Incident Response
- Job Description
-
Job title: SOC Analyst III – Digital Forensics & Incident Response
Role Summary:
Senior security operations specialist who leads advanced threat detection, forensic analysis, and incident response for an enterprise cyber environment. Operates in a 24/7 on‑call model, collaborating closely with engineering and threat intelligence teams, and documents findings to improve security posture.
Expectations:
* Execute end‑to‑end investigation of high‑severity incidents (APTs, insider threats, targeted attacks).
* Provide real‑time incident handling, documentation, and post‑mortem reporting.
* Develop and maintain security playbooks, automation workflows, and tools.
* Conduct proactive threat hunting and malware research.
* Demonstrate strong problem‑solving, analytical, and communication skills across all stakeholder levels.
Key Responsibilities:
* Detect, identify, and respond to cyber events, threats, and vulnerabilities following established policies.
* Perform deep forensic analysis and artifact recovery on Windows, macOS, iOS, Linux, Android, internal applications, and logs.
* Lead investigations, manage incident life cycles, coordinate handoffs, and oversee escalation procedures.
* Provide after‑hours/on‑call support for critical incidents.
* Develop and document security procedures, playbooks, and automation scripts.
* Conduct threat research, trend analysis, and community engagement.
* Author query scripts and implement event enrichment using PowerShell, Python, or equivalent.
* Partner with security engineering and platform teams to optimize tool usage and workflows.
* Build and run continuous security controls testing and validation programs.
* Maintain SIEM, SOAR, EDR, and email defense configurations and tuning.
* Produce post‑incident reports, root cause analysis, and improvement recommendations.
Required Skills:
* 5+ years in cybersecurity, 3+ years in SOC operations.
* Experience in 24/7 operational environments and on‑call rotation.
* Proficiency with PowerShell and/or Python scripting.
* Knowledge of SIEM, SOAR, EDR, email defense, and threat intelligence platforms.
* Strong analytical, troubleshooting, and root‑cause analysis capabilities.
* Ability to write clear documentation, reports, and playbooks.
* Familiarity with cyber security frameworks (NIST, CIS, etc.) and ATT&CK.
* Excellent verbal and written communication, client service, and stakeholder engagement.
* Demonstrated integrity, confidentiality handling, and adaptability to dynamic threats.
Required Education & Certifications:
* Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field (or equivalent work experience).
* Professional certifications (CISSP, CISM, CEH, GCIH, GCIA, GSOC) are a plus but not mandatory.
Los angeles county, United states
Hybrid
Mid level
09-10-2025