SOC L2 Analyst
Role details
Job location
Tech stack
Job description
Seeking a experienced SOC L2 Analyst to strengthen our Security Operations Center. As a Tier 2 CERT Analyst, Candidate will do the investigation and remediation of security incidents using tools such as Splunk and defender and other security stacks. The ideal candidate will have expertise in monitoring and analysing security incidents in SOC.
Requirements
o Solid experience in cybersecurity, with incident response, digital forensics, or threat hunting. o Hands-on experience with SIEM platforms (e.g., Splunk, ArcSight, LogRhythm) and endpoint detection/response (EDR) tools. o Experience in handling complex cyber incidents (e.g., APTs, ransomware, data breaches).
-
Technical Skills: o Proficient in incident response tools and techniques, including network and system forensics, malware analysis, and memory analysis. o Expertise in analysing and responding to threats on different platforms (Windows, Linux, cloud environments, etc.). o Familiarity with scripting languages (Python, PowerShell, etc.) to automate tasks or create custom detection methods.
-
Certifications (Preferred ): o SOC related certifications (preferred) o Certified Information Systems Security Professional (CISSP) - optional o Certified Incident Handler (GCIH, EC-Council) - optional o Certified Forensic Computer Examiner (CFCE) - optional o GIAC Certified Forensic Analyst (GCFA) - optional o GIAC Certified Intrusion Analyst (GCIA) - optional
-
Analytical Skills: o Strong analytical thinking, with the ability to connect seemingly unrelated pieces of information to identify threats. o Excellent troubleshooting, problem-solving, and decision-making skills.
-
Soft Skills: o Strong communication and collaboration skills for working across various teams. o Ability to create clear, actionable reports and present findings to technical and non-technical stakeholders. o Ability to work in high-pressure situations and handle escalated incidents effectively.
-
Work Environment and Conditions: o Work will be performed in a fast-paced, dynamic security operations environment. o Ability to work after hours and on weekends when incidents arise. o Possible on-call rotations for urgent incident response needs