SOC Analyst III
Los Angeles, CA Temporary $65.00 - $100.00/hr Hybrid

Job Description

SOC Analyst III

Workplace Type: Hybrid (2 days onsite, 3 days WFH)

Employment Type: Contract-to-Hire (6-month C@H)

Location: Century City, CA

Industry: Financial Services

Compensation: $65-$100 hourly

About the Role:

We are working with a leading investment management firm in Los Angeles to find a skilled Level 3 SOC Analyst on a contract-to-hire basis. This is an excellent opportunity for a seasoned security professional who is ready to go beyond day-to-day alert triage and take a deeper role in analysis and threat investigation.

As a key member of the Security Operations Center (SOC), you will handle complex alerts, analyze logs, and assess potential risks across enterprise environments. You won't just react - you'll investigate, correlate data, and help tell the story behind each incident to determine what is truly at risk.

Key Responsibilities:

  • Triage and respond to high-level security alerts and incidents
  • Perform in-depth log analysis to identify and understand anomalies
  • Correlate events across multiple systems to build a clear picture of security events
  • Determine the impact, risk, and severity of incidents
  • Collaborate with the red team's monthly testing results to refine detection and response strategies
  • Support continuous improvement of threat detection and incident response processes

Must-Have Qualifications:

  • Strong experience with Splunk for log analysis and correlation
  • Solid understanding of Microsoft environment logs (Active Directory, Exchange, etc.)
  • Experience working in or supporting a cloud environment (Azure), with a focus on interpreting logs from a security standpoint
  • Critical thinking and investigative mindset - not just reacting to alerts, but understanding root causes and risk
  • Strong verbal and written communication skills to articulate findings clearly

Preferred Qualifications:

  • Experience with CrowdStrike EDR - highly preferred
  • Familiarity with Darktrace and AI security
  • Certifications in Splunk and industry relevant Cybersecurity certificates

All qualified applicants will receive consideration for employment without regard to race, color, national origin, age, ancestry, religion, sex, sexual orientation, gender identity, gender expression, marital status, disability, medical condition, genetic information, pregnancy, or military or veteran status. We consider all qualified applicants, including those with criminal histories, in a manner consistent with state and local laws, including the California Fair Chance Act, City of Los Angeles' Fair Chance Initiative for Hiring Ordinance, and Los Angeles County Fair Chance Ordinance. For unincorporated Los Angeles county, to the extent our customers require a background check for certain positions, the Company faces a significant risk to its business operations and business reputation unless a review of criminal history is conducted for those specific job positions.

Job Reference: JN -092025-405932