TQUKI0408_4417 - SOC L2 Analyst

SOC L2 Analyst(3 to 6 Years Experience)


Overview

As a SOC L2 Analyst, you will play a crucial role in the Security Operations Center by handling complex security incidents, conducting deep-dive investigations, and mentoring L1 analysts. You will leverage advanced security tools and technologies to detect, analyze, and respond to sophisticated cyber threats.


Key Responsibilities

1. Advanced Incident Response

  • Investigate and respond to escalated security incidents from L1 analysts
  • Perform in-depth analysis and correlation of security events to identify root cause and impact
  • Develop and implement mitigation strategies to contain and remediate incidents

2. Threat Hunting and Analysis

  • Conduct proactive threat hunting using tools such as Splunk, CrowdStrike, ExtraHop, Proofpoint, etc.
  • Analyze threat intelligence to identify potential risks to the organization

3. Endpoint and Network Security

  • Utilize Cisco AMP and CrowdStrike for advanced endpoint protection and threat analysis
  • Monitor and analyze network traffic using ExtraHop to detect anomalies and intrusions

4. Log Management and SIEM

  • Perform detailed log analysis and correlation using Splunk, CrowdStrike, Proofpoint
  • Suggest and implement improvements to SIEM rules and alerts to enhance detection capabilities

5. Cloud Security

  • Use CASB solutions to monitor and secure cloud services and applications

6. Collaboration and Escalation

  • Collaborate with cross-functional teams to coordinate response efforts
  • Escalate incidents to L3 analysts or specialized teams as needed

7. Documentation and Reporting

  • Document incident findings, actions taken, and lessons learned in JIRA and ServiceNow
  • Prepare detailed incident reports and briefings for management and stakeholders

8. Mentoring and Training

  • Provide guidance and mentorship to L1 analysts
  • Conduct training sessions and workshops on advanced security tools and topics

9. Continuous Improvement

  • Stay updated with the latest cybersecurity threats, trends, and technologies
  • Contribute to refining SOC processes and developing playbooks


Qualifications

  • Bachelor’s degree in Computer Science, Information Security, or a related field (or equivalent experience)
  • 3 to 6 years of experience in a SOC or similar security role
  • Proficiency with tools such as Splunk, CrowdStrike, Proofpoint, ServiceNow, and JIRA
  • Strong understanding of network and endpoint security principles
  • Experience with incident response, threat hunting, and log analysis
  • Excellent analytical, problem-solving, and communication skills
  • Ability to work under pressure and manage multiple tasks simultaneously


Preferred Certifications

  • Certified Ethical Hacker (CEH)
  • GIAC Certified Incident Handler (GCIH)
  • Other relevant cybersecurity certifications


Working Conditions

  • This role requires working in shifts to provide 24/7 security monitoring


Want us
TO WORK FOR YOU?

GET THE QUOTE

Want to
WORK WITH US?

CAREER