Security

L3 SOC Engineer

Are the Senior SOC Engineer with the best detection skills on the market ?

About the Environment

You will join a highly secure and mature cybersecurity environment operating within a critical infrastructure context. The organization plays a key role in maintaining the stability and resilience of essential financial systems and services.

This role offers the opportunity to work on advanced cybersecurity challenges, contribute to SOC maturity, and strengthen detection and response capabilities in a high-impact environment.


Role

Your Role

As an L3 SOC Engineer, you will lead advanced cybersecurity investigations while continuously improving detection engineering and threat monitoring capabilities.

You will combine:

  • Advanced Incident Response
  • Threat Hunting
  • Detection Engineering
  • SOC Process Improvement

This role is ideal for a senior cybersecurity professional who enjoys both hands-on incident response and improving SOC maturity at scale.

Profile

Advanced Incident Response

  • Lead investigations of complex and high-severity cybersecurity incidents
  • Support and guide L1/L2 analysts during escalations
  • Perform forensic investigations and root cause analysis
  • Coordinate containment, eradication, and recovery actions with IT and security teams

Threat Hunting & Advanced Analysis

  • Conduct proactive threat hunting activities
  • Analyze attacker TTPs using frameworks such as MITRE ATT&CK
  • Investigate malware, phishing campaigns, and advanced attack patterns
  • Leverage threat intelligence and behavioral analytics

Detection Engineering

  • Design, develop, and optimize SIEM/EDR/XDR detection use cases
  • Improve detection fidelity and reduce false positives
  • Translate threat intelligence into actionable detection logic
  • Validate detections through simulations, purple teaming, and adversary emulation

SOC Continuous Improvement

  • Improve SOC playbooks, automation, and operational processes
  • Identify gaps in monitoring and incident response
  • Contribute to SOC reporting and maturity initiatives
  • Mentor junior analysts and support knowledge sharing


Offer

  • Strong experience as an L3 Incident Responder
  • Advanced hands-on experience with:
  • Microsoft Sentinel
  • Microsoft Defender XDR
  • Splunk
  • KQL scripting
  • Detection use case development
  • Malware analysis
  • Threat hunting
  • Solid understanding of:
  • MITRE ATT&CK
  • Purple Teaming
  • Vulnerability Management
  • ServiceNow
  • Stamus
  • Experience with:
  • Windows Server environments (2016+)
  • Linux Red Hat
  • Microsoft Azure 


Benefits
  • 3_days_remote3 days remote
At Sander, we treat each application with the strictest confidentiality!
Apply now
Submit your CV today and let us connect you with top employers in your field.