Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
We are seeking an experienced SOC L3 Expert to join our client on a freelance contract basis. The role involves working 2 days per week on-site in Warsaw, with the remainder remote. You will be responsible for leading advanced incident response activities, threat hunting, and mentoring junior analysts in a dynamic security operations environment.
Role Type: Contract / Freelance
Start Date:Immediate / Within 1 Month
Salary: Day Rate
Location/Language:
- Location: Warsaw, Poland (2 days/week on-site) + Remote (3 days/week)
- Language: English (Fluent); Polish is a plus
Requirements Description:
- Must have minimum 5+ years of experience in Security Operations Centers, with at least 2 years in a Level 3 SOC Analyst role
- Strong incident response and forensic investigation skills
- Expert knowledge of SIEM (e.g., Splunk, QRadar, Sentinel), EDR tools (e.g., CrowdStrike, SentinelOne), and network security
Tasks Description:
- Handle high-severity security incidents and lead investigations
- Perform threat hunting using SIEM, EDR, and custom scripts
- Act as escalation point for L1/L2 analysts
- Develop and optimize detection rules, playbooks, and runbooks
- Collaborate with wider security and infrastructure teams
- Recommend improvements to threat detection and response processes
- Analyze threat intelligence and apply it in real-time investigations
Essential Skills/Experience Description:
- Proven experience in L3 SOC or senior incident response roles
- Strong analytical and forensic skills (host/network/memory)
- Familiarity with MITRE ATT&CK, malware analysis techniques, and threat intel platforms
- Hands-on experience with scripting languages (Python, PowerShell, Bash)
- Deep understanding of Windows, Linux, and network protocols
- Ability to operate under pressure and independently during critical incidents
Desirable Skills/Additional Information Description:
- Relevant certifications such as GCIA, GCFA, GNFA, OSCP, CISSP, SC-200
- Experience in hybrid or multi-cloud environments (Azure, AWS, etc.)
- Experience in enterprise environments (finance, telco, critical infrastructure)
- Long-term extension potential based on performance
Team Contact:
📧 jude.russell@next-ventures.com
Key Skills
Ranked by relevanceReady to apply?
Join Next Ventures and take your career to the next level!
Application takes less than 5 minutes