Info Security Specialist III

  • Location: Chicago, Illinois
  • Type: Contract
  • Job #102196

SOC L3 Analyst – Shift 2

Location: Remote (U.S.)
Work Arrangement: Remote – Full Time
Employment Type: Contract (W2)
Estimated Duration: 12 months (potential extension)
Start Date: ASAP
Compensation: $60–$70/hour (W2) with medical, dental, vision, and 401(k)
Schedule: 2nd Shift | Approximately 4:00 PM – 12:45 AM CST
(Shift time may vary by ±1 hour depending on A?side/B?side coverage)

About the Role
We are seeking an experienced SOC L3 Analyst to support a global information security organization. This is a senior individual?contributor role focused on proactive threat detection and threat hunting, with the objective of identifying adversary activity before impact occurs.

The ideal candidate brings strong experience in log analysis, network traffic analysis, and MITRE ATT&CK–aligned threat detection, and is comfortable operating independently during second?shift coverage while collaborating closely with SOC, Threat Intelligence, and Incident Response teams.

Key Responsibilities

  • Proactively hunt for adversary activity across enterprise environments to identify threats early in the attack lifecycle
  • Perform real?time and historical analysis using enterprise security tooling including SIEM, EDR, NDR, IDS/IPS, firewalls, email security, web filtering, and identity management platforms
  • Conduct incident response triage on suspected hosts to assess scope, impact, and potential ongoing attacks
  • Review and validate investigations completed by junior analysts to ensure quality and accuracy
  • Mentor junior SOC staff to support skill development and career growth
  • Stay current on evolving attacker tactics, techniques, and procedures (TTPs)
  • Collaborate with SOC, Threat Intelligence, Incident Response, and Enterprise Security teams on investigations and threat?hunting missions
  • Identify security visibility gaps and recommend tooling or process improvements
  • Develop, maintain, and refine SOC playbooks, detection logic, and response processes based on investigation feedback
  • Coordinate escalation to third?party vendors for advanced forensics, malware reverse engineering, and deep host analysis
  • Clearly communicate security incidents, risks, and findings to business stakeholders and non?technical audiences
  • Perform additional duties as assigned

Required Skills & Experience

  • 5+ years of hands?on experience in cybersecurity or security operations across enterprise environments
  • Strong understanding of SOC operations, incident response lifecycle, and cybersecurity best practices
  • Proven experience with SIEM, SOAR, EDR, and DFIR tools
  • Advanced skills in log analysis, endpoint telemetry, and network traffic analysis
  • Familiarity with security policy development, documentation, and enforcement
  • Working knowledge of regulatory and compliance requirements (SOX, privacy, internal controls)
  • Excellent analytical, problem?solving, and investigative skills
  • Strong written and verbal communication skills, including the ability to explain technical issues to non?technical audiences
  • Ability to manage and complete technical tasks and projects independently
  • Proficiency with Microsoft Office and standard enterprise collaboration tools

Preferred Qualifications

  • Industry certifications such as CISSP, GCFA, GCIH, GCFE, or equivalent
  • Degree in Computer Science, Information Security, or related field (or equivalent experience)
  • Experience supporting regulated environments
  • Insurance industry experience is a plus

#LI-DO1

#INDPRO

Scroll to Top