Job Description
StickmanCyber is rapidly expanding, and we’re looking for a skilled and passionate SOC L3 Analyst to join our elite cybersecurity team. If you thrive in a fast-paced environment, are ready to make an immediate impact, and meet our notice period criteria, we want to hear from you!
Responsibilities:
- Act as the escalation point for complex security incidents within the SOC
- Analyze and correlate security event data from SIEM and SOAR platforms
- Lead threat hunting, malware analysis, and advanced incident response
- Collaborate with cross-functional teams to resolve and document security events
- Mentor junior analysts and contribute to playbook and process improvements
Job Requirements
• Bachelor’s degree in Computer Science or related field
• Minimum of 6 years of experience in Security Operations Center (SOC) roles
• Strong hands-on expertise in SIEM, SOAR, and Google Chronicle
• Deep understanding of security monitoring, detection, and response techniques
• Ability to work independently in a fully remote, fast-paced team
Preferred Qualifications
• Industry certifications such as CISSP, GCIH, GCIA, or equivalent
• Familiarity with MITRE ATT&CK, threat intelligence platforms, and advanced analytics
• Experience with automation and scripting in a SOC environment
• To Apply: Send your updated resume
• Kindly mention your current notice period in the email.
• Only candidates with immediate or 15-day availability will be considered.
About the Company
StickmanCyber is a high-growth cybersecurity company dedicated to helping organizations safeguard their digital assets. We combine expertise, innovation, and cutting-edge technologies to deliver world-class security outcomes. Join us and be part of a team that's making a real difference.