L3 Senior SOC Analyst
Posted: 1 days ago
Job Description
We’re Hiring: Senior SOC Analyst (Level 3)Location: Onsite- Bahria Town Phase-07,Islamabad (Pakistan) Department: Security Operations Center (SOC) Company: IT Butler e-Services FZ LLCAbout Us:IT Butler e-Services FZ LLC is a global cybersecurity solutions provider headquartered in Dubai with operations across the Middle East and South Asia. We specialize in SOC-as-a-Service, Managed Security, and Consulting across multiple cybersecurity domains including SIEM, EDR, NDR, and Threat Intelligence.We are seeking a highly skilled and technically strong Senior SOC Analyst (Level 3) to join our growing SOC team. This is a leadership and escalation-level position, responsible for deep incident investigations, advanced threat hunting, and guiding L1/L2 analysts.Key Responsibilities:Act as primary escalation point for complex or critical security incidents.Lead end-to-end incident response — detection, analysis, containment, eradication, and recovery.Conduct advanced threat hunting using SIEM, EDR, and NDR tools (QRadar, Elastic, CrowdStrike, Darktrace, etc.).Perform malware analysis, log correlation, and forensic investigations to identify root causes and attack vectors.Develop and refine detection rules, correlation logic, and playbooks to enhance SOC detection and response capabilities.Collaborate closely with Threat Intelligence, GRC, and Engineering teams to strengthen defenses.Mentor and technically guide Level 1 and Level 2 analysts to uplift overall SOC maturity.Lead post-incident reviews and prepare detailed reports for internal and client communication.Support SOC audits, compliance requirements, and proactive improvement initiatives.Required Technical Skills:Deep hands-on expertise with SIEM platforms (IBM QRadar, Splunk, Elastic Stack, Azure Sentinel, etc.).Strong working knowledge of EDR/XDR solutions such as CrowdStrike, Trend Micro Vision One, and Microsoft Defender.Experience with NDR solutions like Darktrace or Vectra.In-depth understanding of Windows, Linux, and network log analysis.Practical experience in malware analysis, digital forensics, and reverse engineering (a major plus).Strong command of incident response frameworks (NIST, MITRE ATT&CK, ISO 27035).Experience writing Sigma, YARA, and KQL rules for detections.Familiarity with scripting languages such as Python, PowerShell, or Bash for automation and analysis.Strong knowledge of firewalls, IDS/IPS, proxy, and DLP solutions.Understanding of SOC automation (SOAR tools) and integration workflows.Qualifications:Bachelor’s degree in Cybersecurity, Computer Science, or related field.Minimum 5–7 years of SOC experience with at least 2 years in a Level 3 or senior incident response role.Professional certifications preferred: GCIA, GCIH, GCFA, CEH, CySA+, ECSA, or OSCP.Excellent analytical, problem-solving, and leadership skills.Strong verbal and written communication for client and internal reporting.What We Offer:Competitive salary package based on experience.Exposure to global enterprise MSSP SOC environments.Continuous learning opportunities and advanced security training.Collaborative, growth-oriented, and high-performance work culture.How to Apply:Send your updated resume and certifications to hr@itbutler.sa with the subject line: “Application – Senior SOC Analyst (L3)”
Job Application Tips
- Tailor your resume to highlight relevant experience for this position
- Write a compelling cover letter that addresses the specific requirements
- Research the company culture and values before applying
- Prepare examples of your work that demonstrate your skills
- Follow up on your application after a reasonable time period