StaffAttract
  • Login
  • Create Account
  • Products
    • Private Ad Placement
    • Reports Management
    • Publisher Monetization
    • Search Jobs
  • About Us
  • Contact Us
  • Unsubscribe

Login

Forgot Password?

Create Account

Job title, industry, keywords, etc.
City, State or Postcode

Info Security Specialist III

LHH Recruitment Solutions - Chicago, IL

Apply Now

Job Description

LHH is working with a Chicago-based insurance company that is looking to hire a L3 SOC Analyst to join our team for a 1 year project. The role will be 100% remote and you will be working 2nd shift (4p-1245a CST - plus/minus 1 hour either side based on SOC issues in the environment that day). Candidates MUST be willing to work CST hours in the shift requested (you can sit anywhere in the Lower 48 United States). Candidates MUST be willing to work as a w2 employee of LHH to be considered. No c2c please. About the Role We are seeking a Senior Security Operations Center (SOC) Analyst to join a global information security team supporting 24x7 operations. This role is focused on proactive threat detection, incident triage, and adversary activity analysis, with the goal of identifying and disrupting attacks before objectives are achieved. This is a handson individual contributor role with additional responsibilities for mentoring junior analysts, improving detection capabilities, and collaborating closely with Incident Response, Threat Intelligence, and Enterprise Security teams. Key Responsibilities Proactively identify adversary activity through realtime and historical security analysis Conduct advanced log analysis, network traffic analysis, and endpoint investigation Perform incident response triage to determine scope, impact, and containment needs Analyze activity using the MITRE ATT&CK framework to identify attacker TTPs Review and validate analysis performed by junior SOC analysts to ensure quality and accuracy Mentor junior staff and contribute to team development and operational maturity Stay current on emerging threat actors, tools, and techniques Collaborate with SOC, Incident Response, Threat Intelligence, and Enterprise Security teams on investigations and threathunting initiatives Identify visibility gaps and recommend improvements to tools, telemetry, and processes Develop, maintain, and refine SOC playbooks, detection logic, and response procedures Coordinate escalation to thirdparty vendors for advanced forensics, malware analysis, or specialized investigations Clearly communicate security incidents and findings to both technical and nontechnical stakeholders Participate in additional security initiatives as needed Technology & Tools Experience working with enterprise security technologies, including but not limited to: SIEM & SOAR platforms Endpoint Protection & EDR Network Detection & Response (NDR) Firewalls, IDS/IPS Email Security & Web Content Filtering Identity & Access Management solutions Required Qualifications 5+ years of handson experience in a SOC, security operations, or incident response role Strong understanding of the incident response lifecycle Proven experience with log analysis, threat hunting, and security investigations Solid knowledge of security controls, policies, and operational best practices Working knowledge of regulatory and compliance considerations (e.g., SOX, privacy, internal controls) Strong analytical and problemsolving skills Excellent written and verbal communication skills Ability to clearly articulate technical security concepts to nontechnical audiences Experience working collaboratively in distributed or global security teams Preferred Qualifications Experience supporting regulated environments (e.g., financial services or insurance) Familiarity with DFIR workflows and forensic investigation processes Industry certifications such as: CISSP GCIH GCFA GCFE or equivalent security certifications Why This Role 100% remote opportunity Exposure to advanced threat detection and response scenarios Opportunity to influence SOC processes, tooling, and detection strategy Collaborative global security environment Meaningful mentorship and leadership impact without people management Pay Details: $52.00 to $60.00 per hour Search managed by: William Staadt Benefit offerings available for our associates include medical, dental, vision, life insurance, short-term disability, additional voluntary benefits, EAP program, commuter benefits and a 401K plan. Our benefit offerings provide employees the flexibility to choose the type of coverage that meets their individual needs. In addition, our associates may be eligible for paid leave including Paid Sick Leave or any other paid leave required by Federal, State, or local law, as well as Holiday pay where applicable. Equal Opportunity Employer/Veterans/Disabled Military connected talent encouraged to apply To read our Candidate Privacy Information Statement, which explains how we will use your information, please navigate to The Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable: The California Fair Chance Act Los Angeles City Fair Chance Ordinance Los Angeles County Fair Chance Ordinance for Employers San Francisco Fair Chance Ordinance Massachusetts Candidates Only: It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.

Created: 2026-03-10

➤
Footer Logo
Privacy Policy | Terms & Conditions | Contact Us | About Us
Designed, Developed and Maintained by: NextGen TechEdge Solutions Pvt. Ltd.