Security Operation Centre L2

Nets-international Communication
Croydon, United Kingdom
8 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Intermediate

Job location

Croydon, United Kingdom

Tech stack

Computer Security
Intrusion Detection Systems
Python
Network Security
Log Analysis
Powershell
Security Information and Event Management
Scripting (Bash/Python/Go/Ruby)
Mitre Att&ck
Malware
Firewalls (Computer Science)
Information Technology

Job description

The SOC L2 Analyst is responsible for deeper analysis and incident response. They investigate alerts escalated by L1 analysts, perform root cause analysis, and coordinate containment and remediation efforts. L2 Analysts act as incident handlers and guide L1s on analysis procedures., * Investigate and validate escalated incidents from SOC L1.

  • Perform detailed log analysis across multiple systems (firewalls, endpoints, servers).
  • Identify attack patterns, indicators of compromise (IOCs), and determine the scope and impact of attacks.
  • Coordinate with IT and security teams to contain and eradicate threats.
  • Develop and maintain incident response playbooks.
  • Perform threat hunting using EDR/XDR and SIEM tools.
  • Conduct malware analysis and support forensics where needed.
  • Mentor and train SOC L1 Analysts on triage and alert handling.
  • Contribute to improving detection rules and automation.
  • Document incidents thoroughly and prepare post-incident reports.

Requirements

Do you have experience in Scripting?, Do you have a Bachelor's degree?, * Strong understanding of network security, firewalls, intrusion detection systems.

  • Experience with SIEM, EDR/XDR, and threat intelligence tools.
  • Knowledge of incident response lifecycle and MITRE ATT&CK framework.
  • Ability to analyze logs from multiple sources and correlate events.
  • Scripting or automation skills (Python, PowerShell) are an advantage.

Education & Certifications

  • Bachelor's in Cybersecurity, Computer Science, or Information Security.
  • 3 to 5 years of SOC or cybersecurity experience.
  • Preferred certifications:
  • CompTIA CySA+
  • EC-Council Certified SOC Analyst (CSA)
  • Microsoft SC-200
  • GIAC Certified Incident Handler (GCIH)
  • Certified Ethical Hacker (CEH)

Job Type: Full-time

Ability to commute/relocate:

  • London CR0: reliably commute or plan to relocate before starting work (required), * Bachelor's (required), * Security Operation Centre L2: 5 years (required)

Apply for this position