Skip To Main Content

Info Security Specialist III (2nd shift - 4p - 1245a CST) - Remote

IT & Digital

LHH

$52.00 - $60.00 per Hour

Chicago, Illinois

Contractor

IT & Digital

LHH is working with a Chicago-based insurance company that is looking to hire a L3 SOC Analyst to join our team for a 1 year project. The role will be 100% remote and you will be working 2nd shift (4p-1245a CST — plus/minus 1 hour either side based on SOC issues in the environment that day).

  • Candidates MUST be willing to work CST hours in the shift requested (you can sit anywhere in the Lower 48 United States).

  • Candidates MUST be willing to work as a w2 employee of LHH to be considered. No c2c please.


About the Role

We are seeking a Senior Security Operations Center (SOC) Analyst to join a global information security team supporting 24x7 operations. This role is focused on proactive threat detection, incident triage, and adversary activity analysis, with the goal of identifying and disrupting attacks before objectives are achieved.

This is a hands‑on individual contributor role with additional responsibilities for mentoring junior analysts, improving detection capabilities, and collaborating closely with Incident Response, Threat Intelligence, and Enterprise Security teams.


Key Responsibilities

  • Proactively identify adversary activity through real‑time and historical security analysis

  • Conduct advanced log analysis, network traffic analysis, and endpoint investigation

  • Perform incident response triage to determine scope, impact, and containment needs

  • Analyze activity using the MITRE ATT&CK framework to identify attacker TTPs

  • Review and validate analysis performed by junior SOC analysts to ensure quality and accuracy

  • Mentor junior staff and contribute to team development and operational maturity

  • Stay current on emerging threat actors, tools, and techniques

  • Collaborate with SOC, Incident Response, Threat Intelligence, and Enterprise Security teams on investigations and threat‑hunting initiatives

  • Identify visibility gaps and recommend improvements to tools, telemetry, and processes

  • Develop, maintain, and refine SOC playbooks, detection logic, and response procedures

  • Coordinate escalation to third‑party vendors for advanced forensics, malware analysis, or specialized investigations

  • Clearly communicate security incidents and findings to both technical and non‑technical stakeholders

  • Participate in additional security initiatives as needed


Technology & Tools

Experience working with enterprise security technologies, including but not limited to:

  • SIEM & SOAR platforms

  • Endpoint Protection & EDR

  • Network Detection & Response (NDR)

  • Firewalls, IDS/IPS

  • Email Security & Web Content Filtering

  • Identity & Access Management solutions


Required Qualifications

  • 5+ years of hands‑on experience in a SOC, security operations, or incident response role

  • Strong understanding of the incident response lifecycle

  • Proven experience with log analysis, threat hunting, and security investigations

  • Solid knowledge of security controls, policies, and operational best practices

  • Working knowledge of regulatory and compliance considerations (e.g., SOX, privacy, internal controls)

  • Strong analytical and problem‑solving skills

  • Excellent written and verbal communication skills

  • Ability to clearly articulate technical security concepts to non‑technical audiences

  • Experience working collaboratively in distributed or global security teams


Preferred Qualifications

  • Experience supporting regulated environments (e.g., financial services or insurance)

  • Familiarity with DFIR workflows and forensic investigation processes

  • Industry certifications such as:

    • CISSP

    • GCIH

    • GCFA

    • GCFE

    • or equivalent security certifications


Why This Role

  • 100% remote opportunity

  • Exposure to advanced threat detection and response scenarios

  • Opportunity to influence SOC processes, tooling, and detection strategy

  • Collaborative global security environment

  • Meaningful mentorship and leadership impact without people management



Pay Details: $52.00 to $60.00 per hour

Search managed by: William Staadt

Benefit offerings available for our associates include medical, dental, vision, life insurance, short-term disability, additional voluntary benefits, EAP program, commuter benefits and a 401K plan. Our benefit offerings provide employees the flexibility to choose the type of coverage that meets their individual needs. In addition, our associates may be eligible for paid leave including Paid Sick Leave or any other paid leave required by Federal, State, or local law, as well as Holiday pay where applicable.



Equal Opportunity Employer/Veterans/Disabled



Military connected talent encouraged to apply



To read our Candidate Privacy Information Statement, which explains how we will use your information, please navigate to https://www.lhh.com/us/en/candidate-privacy



The Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable:


  • The California Fair Chance Act
  • Los Angeles City Fair Chance Ordinance
  • Los Angeles County Fair Chance Ordinance for Employers
  • San Francisco Fair Chance Ordinance


Massachusetts Candidates Only: It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.


Ref US_EN_27_844845_3117102

Info Security Specialist III (2nd shift - 4p - 1245a CST) - Remote

IT & Digital

LHH

$52.00 - $60.00 per Hour

Chicago, Illinois

Contractor

IT & Digital

LHH is working with a Chicago-based insurance company that is looking to hire a L3 SOC Analyst to join our team for a 1 year project. The role will be 100% remote and you will be working 2nd shift (4p-1245a CST — plus/minus 1 hour either side based on SOC issues in the environment that day).

  • Candidates MUST be willing to work CST hours in the shift requested (you can sit anywhere in the Lower 48 United States).

  • Candidates MUST be willing to work as a w2 employee of LHH to be considered. No c2c please.


About the Role

We are seeking a Senior Security Operations Center (SOC) Analyst to join a global information security team supporting 24x7 operations. This role is focused on proactive threat detection, incident triage, and adversary activity analysis, with the goal of identifying and disrupting attacks before objectives are achieved.

This is a hands‑on individual contributor role with additional responsibilities for mentoring junior analysts, improving detection capabilities, and collaborating closely with Incident Response, Threat Intelligence, and Enterprise Security teams.


Key Responsibilities

  • Proactively identify adversary activity through real‑time and historical security analysis

  • Conduct advanced log analysis, network traffic analysis, and endpoint investigation

  • Perform incident response triage to determine scope, impact, and containment needs

  • Analyze activity using the MITRE ATT&CK framework to identify attacker TTPs

  • Review and validate analysis performed by junior SOC analysts to ensure quality and accuracy

  • Mentor junior staff and contribute to team development and operational maturity

  • Stay current on emerging threat actors, tools, and techniques

  • Collaborate with SOC, Incident Response, Threat Intelligence, and Enterprise Security teams on investigations and threat‑hunting initiatives

  • Identify visibility gaps and recommend improvements to tools, telemetry, and processes

  • Develop, maintain, and refine SOC playbooks, detection logic, and response procedures

  • Coordinate escalation to third‑party vendors for advanced forensics, malware analysis, or specialized investigations

  • Clearly communicate security incidents and findings to both technical and non‑technical stakeholders

  • Participate in additional security initiatives as needed


Technology & Tools

Experience working with enterprise security technologies, including but not limited to:

  • SIEM & SOAR platforms

  • Endpoint Protection & EDR

  • Network Detection & Response (NDR)

  • Firewalls, IDS/IPS

  • Email Security & Web Content Filtering

  • Identity & Access Management solutions


Required Qualifications

  • 5+ years of hands‑on experience in a SOC, security operations, or incident response role

  • Strong understanding of the incident response lifecycle

  • Proven experience with log analysis, threat hunting, and security investigations

  • Solid knowledge of security controls, policies, and operational best practices

  • Working knowledge of regulatory and compliance considerations (e.g., SOX, privacy, internal controls)

  • Strong analytical and problem‑solving skills

  • Excellent written and verbal communication skills

  • Ability to clearly articulate technical security concepts to non‑technical audiences

  • Experience working collaboratively in distributed or global security teams


Preferred Qualifications

  • Experience supporting regulated environments (e.g., financial services or insurance)

  • Familiarity with DFIR workflows and forensic investigation processes

  • Industry certifications such as:

    • CISSP

    • GCIH

    • GCFA

    • GCFE

    • or equivalent security certifications


Why This Role

  • 100% remote opportunity

  • Exposure to advanced threat detection and response scenarios

  • Opportunity to influence SOC processes, tooling, and detection strategy

  • Collaborative global security environment

  • Meaningful mentorship and leadership impact without people management



Pay Details: $52.00 to $60.00 per hour

Search managed by: William Staadt

Benefit offerings available for our associates include medical, dental, vision, life insurance, short-term disability, additional voluntary benefits, EAP program, commuter benefits and a 401K plan. Our benefit offerings provide employees the flexibility to choose the type of coverage that meets their individual needs. In addition, our associates may be eligible for paid leave including Paid Sick Leave or any other paid leave required by Federal, State, or local law, as well as Holiday pay where applicable.



Equal Opportunity Employer/Veterans/Disabled



Military connected talent encouraged to apply



To read our Candidate Privacy Information Statement, which explains how we will use your information, please navigate to https://www.lhh.com/us/en/candidate-privacy



The Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable:


  • The California Fair Chance Act
  • Los Angeles City Fair Chance Ordinance
  • Los Angeles County Fair Chance Ordinance for Employers
  • San Francisco Fair Chance Ordinance


Massachusetts Candidates Only: It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.


Ref US_EN_27_844845_3117102
Start Your Application Here
Submit your personal information and your resume and get started with finding your dream job today.