Info Security Specialist III (2nd shift - 4p - 1245a CST) - Remote
IT & Digital
LHH
$52.00 - $60.00 per Hour
Chicago, IllinoisContractor
IT & Digital
LHH is working with a Chicago-based insurance company that is looking to hire a L3 SOC Analyst to join our team for a 1 year project. The role will be 100% remote and you will be working 2nd shift (4p-1245a CST — plus/minus 1 hour either side based on SOC issues in the environment that day).
Candidates MUST be willing to work CST hours in the shift requested (you can sit anywhere in the Lower 48 United States).
Candidates MUST be willing to work as a w2 employee of LHH to be considered. No c2c please.
About the Role
We are seeking a Senior Security Operations Center (SOC) Analyst to join a global information security team supporting 24x7 operations. This role is focused on proactive threat detection, incident triage, and adversary activity analysis, with the goal of identifying and disrupting attacks before objectives are achieved.
This is a hands‑on individual contributor role with additional responsibilities for mentoring junior analysts, improving detection capabilities, and collaborating closely with Incident Response, Threat Intelligence, and Enterprise Security teams.
Key Responsibilities
Proactively identify adversary activity through real‑time and historical security analysis
Conduct advanced log analysis, network traffic analysis, and endpoint investigation
Perform incident response triage to determine scope, impact, and containment needs
Analyze activity using the MITRE ATT&CK framework to identify attacker TTPs
Review and validate analysis performed by junior SOC analysts to ensure quality and accuracy
Mentor junior staff and contribute to team development and operational maturity
Stay current on emerging threat actors, tools, and techniques
Collaborate with SOC, Incident Response, Threat Intelligence, and Enterprise Security teams on investigations and threat‑hunting initiatives
Identify visibility gaps and recommend improvements to tools, telemetry, and processes
Develop, maintain, and refine SOC playbooks, detection logic, and response procedures
Coordinate escalation to third‑party vendors for advanced forensics, malware analysis, or specialized investigations
Clearly communicate security incidents and findings to both technical and non‑technical stakeholders
Participate in additional security initiatives as needed
Technology & Tools
Experience working with enterprise security technologies, including but not limited to:
SIEM & SOAR platforms
Endpoint Protection & EDR
Network Detection & Response (NDR)
Firewalls, IDS/IPS
Email Security & Web Content Filtering
Identity & Access Management solutions
Required Qualifications
5+ years of hands‑on experience in a SOC, security operations, or incident response role
Strong understanding of the incident response lifecycle
Proven experience with log analysis, threat hunting, and security investigations
Solid knowledge of security controls, policies, and operational best practices
Working knowledge of regulatory and compliance considerations (e.g., SOX, privacy, internal controls)
Strong analytical and problem‑solving skills
Excellent written and verbal communication skills
Ability to clearly articulate technical security concepts to non‑technical audiences
Experience working collaboratively in distributed or global security teams
Preferred Qualifications
Experience supporting regulated environments (e.g., financial services or insurance)
Familiarity with DFIR workflows and forensic investigation processes
Industry certifications such as:
CISSP
GCIH
GCFA
GCFE
or equivalent security certifications
Why This Role
100% remote opportunity
Exposure to advanced threat detection and response scenarios
Opportunity to influence SOC processes, tooling, and detection strategy
Collaborative global security environment
Meaningful mentorship and leadership impact without people management
Pay Details: $52.00 to $60.00 per hour
Search managed by: William Staadt
Benefit offerings available for our associates include medical, dental, vision, life insurance, short-term disability, additional voluntary benefits, EAP program, commuter benefits and a 401K plan. Our benefit offerings provide employees the flexibility to choose the type of coverage that meets their individual needs. In addition, our associates may be eligible for paid leave including Paid Sick Leave or any other paid leave required by Federal, State, or local law, as well as Holiday pay where applicable.
Equal Opportunity Employer/Veterans/Disabled
Military connected talent encouraged to apply
To read our Candidate Privacy Information Statement, which explains how we will use your information, please navigate to https://www.lhh.com/us/en/candidate-privacy
The Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable:
- The California Fair Chance Act
- Los Angeles City Fair Chance Ordinance
- Los Angeles County Fair Chance Ordinance for Employers
- San Francisco Fair Chance Ordinance
Massachusetts Candidates Only: It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
Info Security Specialist III (2nd shift - 4p - 1245a CST) - Remote
IT & Digital
LHH
$52.00 - $60.00 per Hour
Chicago, IllinoisContractor
IT & Digital
LHH is working with a Chicago-based insurance company that is looking to hire a L3 SOC Analyst to join our team for a 1 year project. The role will be 100% remote and you will be working 2nd shift (4p-1245a CST — plus/minus 1 hour either side based on SOC issues in the environment that day).
Candidates MUST be willing to work CST hours in the shift requested (you can sit anywhere in the Lower 48 United States).
Candidates MUST be willing to work as a w2 employee of LHH to be considered. No c2c please.
About the Role
We are seeking a Senior Security Operations Center (SOC) Analyst to join a global information security team supporting 24x7 operations. This role is focused on proactive threat detection, incident triage, and adversary activity analysis, with the goal of identifying and disrupting attacks before objectives are achieved.
This is a hands‑on individual contributor role with additional responsibilities for mentoring junior analysts, improving detection capabilities, and collaborating closely with Incident Response, Threat Intelligence, and Enterprise Security teams.
Key Responsibilities
Proactively identify adversary activity through real‑time and historical security analysis
Conduct advanced log analysis, network traffic analysis, and endpoint investigation
Perform incident response triage to determine scope, impact, and containment needs
Analyze activity using the MITRE ATT&CK framework to identify attacker TTPs
Review and validate analysis performed by junior SOC analysts to ensure quality and accuracy
Mentor junior staff and contribute to team development and operational maturity
Stay current on emerging threat actors, tools, and techniques
Collaborate with SOC, Incident Response, Threat Intelligence, and Enterprise Security teams on investigations and threat‑hunting initiatives
Identify visibility gaps and recommend improvements to tools, telemetry, and processes
Develop, maintain, and refine SOC playbooks, detection logic, and response procedures
Coordinate escalation to third‑party vendors for advanced forensics, malware analysis, or specialized investigations
Clearly communicate security incidents and findings to both technical and non‑technical stakeholders
Participate in additional security initiatives as needed
Technology & Tools
Experience working with enterprise security technologies, including but not limited to:
SIEM & SOAR platforms
Endpoint Protection & EDR
Network Detection & Response (NDR)
Firewalls, IDS/IPS
Email Security & Web Content Filtering
Identity & Access Management solutions
Required Qualifications
5+ years of hands‑on experience in a SOC, security operations, or incident response role
Strong understanding of the incident response lifecycle
Proven experience with log analysis, threat hunting, and security investigations
Solid knowledge of security controls, policies, and operational best practices
Working knowledge of regulatory and compliance considerations (e.g., SOX, privacy, internal controls)
Strong analytical and problem‑solving skills
Excellent written and verbal communication skills
Ability to clearly articulate technical security concepts to non‑technical audiences
Experience working collaboratively in distributed or global security teams
Preferred Qualifications
Experience supporting regulated environments (e.g., financial services or insurance)
Familiarity with DFIR workflows and forensic investigation processes
Industry certifications such as:
CISSP
GCIH
GCFA
GCFE
or equivalent security certifications
Why This Role
100% remote opportunity
Exposure to advanced threat detection and response scenarios
Opportunity to influence SOC processes, tooling, and detection strategy
Collaborative global security environment
Meaningful mentorship and leadership impact without people management
Pay Details: $52.00 to $60.00 per hour
Search managed by: William Staadt
Benefit offerings available for our associates include medical, dental, vision, life insurance, short-term disability, additional voluntary benefits, EAP program, commuter benefits and a 401K plan. Our benefit offerings provide employees the flexibility to choose the type of coverage that meets their individual needs. In addition, our associates may be eligible for paid leave including Paid Sick Leave or any other paid leave required by Federal, State, or local law, as well as Holiday pay where applicable.
Equal Opportunity Employer/Veterans/Disabled
Military connected talent encouraged to apply
To read our Candidate Privacy Information Statement, which explains how we will use your information, please navigate to https://www.lhh.com/us/en/candidate-privacy
The Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable:
- The California Fair Chance Act
- Los Angeles City Fair Chance Ordinance
- Los Angeles County Fair Chance Ordinance for Employers
- San Francisco Fair Chance Ordinance
Massachusetts Candidates Only: It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.