

Openkyber
Head of Identity Security
⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is a contract position for a Head of Identity Security in Phoenix, AZ, with a pay rate of "X". Candidates must have SOC experience, strong SIEM knowledge, malware analysis skills, and familiarity with AWS and Google Cloud security. Certifications preferred.
🌎 - Country
United States
💱 - Currency
Unknown
-
💰 - Day rate
Unknown
-
🗓️ - Date
February 13, 2026
🕒 - Duration
Unknown
-
🏝️ - Location
Remote
-
📄 - Contract
Unknown
-
🔒 - Security
Yes
-
📍 - Location detailed
Arizona
-
🧠 - Skills detailed
#Scala #Firewalls #GCP (Google Cloud Platform) #Cloud #Monitoring #Security #AWS (Amazon Web Services) #Splunk #Documentation #Compliance #Automation #IP (Internet Protocol)
Role description
We are looking for Security Operations Center for our client in Phoenix, AZ
Job Title: Security Operations Center
Job Location: Phoenix, AZ
Job Type: Contract
Job Description: The Security Operations Center professional will be responsible for monitoring, analyzing, and responding to security incidents within a 24x7 SOC environment. This role focuses on incident response, malware analysis, cloud security monitoring, and continuous improvement of detection and response capabilities across on-prem and cloud environments.
Responsibilities:
Monitor and analyze security alerts generated from SIEM, EDR, and other security tools within a SOC environment.
Lead and execute incident response activities including triage, containment, eradication, and recovery.
Perform static and dynamic malware analysis to identify root cause and attacker behavior.
Investigate network traffic, logs, and data flows to detect suspicious or malicious activity.
Respond to cloud security incidents across AWS and Google Cloud Platform environments.
Coordinate with Tier 1 and Tier 2 SOC analysts and escalate incidents as required.
Conduct post-incident analysis and prepare detailed incident reports and root cause analysis documentation.
Tune SIEM use cases, alerts, and detection rules to reduce false positives.
Support endpoint protection and EDR tools for threat detection and response.
Assist with threat hunting and proactive security monitoring activities.
Follow and enforce information security policies, standards, and incident response playbooks.
Requirement / Must Have: Hands-on experience working in a SOC or Incident Response role. Strong knowledge of SIEM platforms such as Splunk, QRadar, Sentinel, ArcSight, or equivalent. Experience with incident response frameworks and SOC workflows. Proficiency in static and dynamic malware analysis. Solid understanding of networking fundamentals including TCP/IP, DNS, firewalls, and proxies. Experience analyzing logs, packet captures, and data flows. Hands-on experience with endpoint protection and EDR solutions. Working knowledge of AWS and Google Cloud Platform security services. Strong troubleshooting and analytical skills.
Experience: Prior experience supporting 24x7 SOC operations and handling high-severity security incidents.
Should Have: Experience with SOAR tools and security automation. Exposure to threat intelligence platforms, MITRE ATT&CK framework, and threat hunting. Familiarity with compliance frameworks such as NIST, ISO 27001, and SOC 2.
Skills: Incident response and cyber threat analysis. Malware analysis and forensic investigation. Cloud security monitoring and response. Log analysis and network traffic investigation. Clear documentation and reporting skills. Ability to remain calm and effective during critical incidents.
Certification And Education: Incident Response certifications such as GCIH, GCIA, ED preferred. Security certifications such as Security+, CEH, CISSP, or equivalent preferred. AWS Security certification preferred. Google Cloud Platform Professional Cloud Security Engineer certification preferred.
For applications and inquiries, contact: hirings@openkyber.com
We are looking for Security Operations Center for our client in Phoenix, AZ
Job Title: Security Operations Center
Job Location: Phoenix, AZ
Job Type: Contract
Job Description: The Security Operations Center professional will be responsible for monitoring, analyzing, and responding to security incidents within a 24x7 SOC environment. This role focuses on incident response, malware analysis, cloud security monitoring, and continuous improvement of detection and response capabilities across on-prem and cloud environments.
Responsibilities:
Monitor and analyze security alerts generated from SIEM, EDR, and other security tools within a SOC environment.
Lead and execute incident response activities including triage, containment, eradication, and recovery.
Perform static and dynamic malware analysis to identify root cause and attacker behavior.
Investigate network traffic, logs, and data flows to detect suspicious or malicious activity.
Respond to cloud security incidents across AWS and Google Cloud Platform environments.
Coordinate with Tier 1 and Tier 2 SOC analysts and escalate incidents as required.
Conduct post-incident analysis and prepare detailed incident reports and root cause analysis documentation.
Tune SIEM use cases, alerts, and detection rules to reduce false positives.
Support endpoint protection and EDR tools for threat detection and response.
Assist with threat hunting and proactive security monitoring activities.
Follow and enforce information security policies, standards, and incident response playbooks.
Requirement / Must Have: Hands-on experience working in a SOC or Incident Response role. Strong knowledge of SIEM platforms such as Splunk, QRadar, Sentinel, ArcSight, or equivalent. Experience with incident response frameworks and SOC workflows. Proficiency in static and dynamic malware analysis. Solid understanding of networking fundamentals including TCP/IP, DNS, firewalls, and proxies. Experience analyzing logs, packet captures, and data flows. Hands-on experience with endpoint protection and EDR solutions. Working knowledge of AWS and Google Cloud Platform security services. Strong troubleshooting and analytical skills.
Experience: Prior experience supporting 24x7 SOC operations and handling high-severity security incidents.
Should Have: Experience with SOAR tools and security automation. Exposure to threat intelligence platforms, MITRE ATT&CK framework, and threat hunting. Familiarity with compliance frameworks such as NIST, ISO 27001, and SOC 2.
Skills: Incident response and cyber threat analysis. Malware analysis and forensic investigation. Cloud security monitoring and response. Log analysis and network traffic investigation. Clear documentation and reporting skills. Ability to remain calm and effective during critical incidents.
Certification And Education: Incident Response certifications such as GCIH, GCIA, ED preferred. Security certifications such as Security+, CEH, CISSP, or equivalent preferred. AWS Security certification preferred. Google Cloud Platform Professional Cloud Security Engineer certification preferred.
For applications and inquiries, contact: hirings@openkyber.com






