Job Title: Information Security Engineer

Location: Charlotte, NC (Hybrid)

Duration: 18 Month Contract

Pay Rate: $54/hr W2 ONLY, NO C2C

Job Description:

The Information Security Engineer will play a key role in strengthening the organization’s cybersecurity posture by designing, implementing, and managing advanced security technologies and tools. This role focuses on EDR (Endpoint Detection and Response), SIEM (Security Information and Event Management), SOAR (Security Orchestration, Automation, and Response), and SOC (Security Operations Center) operations. The engineer will collaborate closely with security analysts, architects, and infrastructure teams to identify, investigate, and mitigate cyber threats in real time.

Key Responsibilities:

  • Implement, configure, and maintain EDR, SIEM, and SOAR platforms to enhance visibility and threat response capabilities.
  • Support daily SOC operations, including monitoring, triaging, and responding to security incidents.
  • Develop and fine-tune detection rules, correlation logic, and automation playbooks.
  • Integrate multiple security tools and systems to enable efficient event correlation and automated remediation.
  • Conduct root-cause analysis of security incidents and document lessons learned.
  • Partner with IT, network, and cloud teams to ensure consistent application of security policies and controls.
  • Continuously evaluate emerging threats and recommend appropriate mitigation strategies.
  • Develop and maintain technical documentation, runbooks, and standard operating procedures.

Required Skills & Experience:

  • 3–7 years of experience as an Information Security Engineer or in a SOC/SIEM/EDR-focused role.
  • Strong working knowledge of:
    • EDR tools (e.g., CrowdStrike, SentinelOne, Carbon Black, Defender for Endpoint)
    • SIEM platforms (e.g., Splunk, QRadar, Azure Sentinel, Elastic, ArcSight)
    • SOAR tools (e.g., Cortex XSOAR, Splunk Phantom, ServiceNow SOAR)
    • SOC operations and incident response processes
  • Experience developing and maintaining automation playbooks to improve incident response time.
  • Strong understanding of network security, endpoint protection, threat detection, and vulnerability management.
  • Proficiency in Python, PowerShell, or Bash scripting for automation and integration tasks.
  • Familiarity with MITRE ATT&CK, NIST, or similar cybersecurity frameworks.

Preferred Qualifications:

  • Experience with cloud security monitoring in AWS, Azure, or GCP.
  • Knowledge of threat hunting and digital forensics techniques.
  • Experience working in a regulated environment (finance, utilities, or healthcare).
  • Relevant certifications such as:
    • Security+, CEH, CISSP, GSEC, Splunk Certified, or GIAC (GCIH, GCIA).
Read Full Description
Confirmed 3 hours ago. Posted 2 days ago.

Discover Similar Jobs

Suggested Articles