SOC Analyst Tier 2
Listed on 2026-01-26
-
IT/Tech
Cybersecurity, IT Support, Security Manager, Network Security
- Provide technical escalation point for Tier 1 Analysts on security incidents, alerts, and inquiries requiring input on security risk, privacy, or threats.
Be available to assist Tier 1 Analysts with critical incidents and serve as a reference for alerts and inquiries.
Perform analysis of log files.
Conduct log analysis for suspicious events.
Feed data back to threat intelligence sources when new threats are discovered during investigations.
Take an active role in incident containment, including post-escalation phases.
Assist Tier 3 Analysts with system breach investigations.
Assist Tier 3 Analysts with high-tier incidents.
Act on vulnerability findings by opening incident tickets against affected assets.
Proactively update systems to ensure latest patches are deployed.
Document remediation steps required during incident handling or vulnerability identification.
Record new incidents and corresponding resolution procedures.
Track remediation tickets to support a closed-loop process.
Handle client requests and track them through to fulfillment.
Manage whitelists and blacklists in SIEM; disseminate updates to appropriate operators for tool or policy updates.
Manage and block suspicious IPs in Azure Sentinel.
Update work procedures and documentation.
Issue documentation and proactively contact system asset owners post-incident to confirm resolution.
ExperienceStrong knowledge and hands-on experience with SIEM solutions, including QRadar, McAfee ESM, and Azure Sentinel.
3 to 5 years of IT Infrastructure Support experience.
Additional 2 to 3 years of experience as a Tier 2 SOC Analyst or Threat Hunter (Red Teaming) in an established SOC.
Advanced knowledge of network technologies (protocols, design concepts, access control).
Advanced knowledge of security technologies (firewalls, web gateways, endpoint protection, vulnerability management, network infrastructure, etc.).
Advanced technical and problem-solving skills in IT infrastructure.
Solid experience with email security solutions.
Strong background in vulnerability management.
Good understanding of the MITRE ATT&CK framework.
Good understanding of the ITIL Framework.
Proficient in using support ticketing systems and achieving SLA targets.
Familiarity with risk management and quality assurance controls.
Excellent interpersonal skills and professional demeanor.
Excellent verbal and written communication skills.
Proficient in Microsoft Office applications.
Eligible to obtain National Security Clearance.
Excellent customer service capabilities.
QualificationsGrade 12 certificate.
Certified Ethical Hacker (CEH).
Degree or diploma in Computer Technology.
#J-18808-LjbffrTo Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: