More jobs:
SOC Level 2 Analyst; Q Clearance
Job in
North Las Vegas, Clark County, Nevada, 89095, USA
Listed on 2026-01-01
Listing for:
ShorePoint Inc
Full Time
position Listed on 2026-01-01
Job specializations:
-
IT/Tech
Cybersecurity
Job Description & How to Apply Below
SOC Level 2 Analyst (Q Clearance)
Join ShorePoint Inc as a SOC Level 2 Analyst in a fast‑growing cybersecurity services firm. This role plays a key part in identifying, investigating and mitigating security incidents within a 24/7 Security Operations Center.
Who We AreShorePoint is a recognized, award‑winning cybersecurity firm serving high‑profile private and public‑sector customers.
The Perks18 days PTO, 11 holidays, 85% insurance premium covered, 401(k), continuous education, certifications, and more.
We’re Looking ForWe seek a SOC Level 2 Analyst ready to contribute to threat detection, content development and continuous service improvement.
What You’ll Be Doing- Monitor client sources of potential security incidents, health alerts with monitored solutions and requests for information.
- Follow client and incident‑specific procedures to perform triage of potential security incidents to validate and determine needed mitigation.
- Escalate potential security incidents to client personnel, implement countermeasures in response to others and recommend operational improvements.
- Keep accurate incident notes in the case management system.
- Maintain awareness of the client’s technology architecture, known weaknesses, the architecture of the security solutions used for monitoring, imminent and pervasive threats as identified by client threat intelligence and recent security incidents.
- Provide advanced analysis of the results of the monitoring solutions, assess escalated outputs and alerts from Level 1 Analysts.
- Perform web hunting for new patterns/activities.
- Advise on content development and testing.
- Provide advice and guidance on the response action plans for information risk events and incidents based on incident type and severity.
- Ensure that all identified events are promptly validated and thoroughly investigated.
- Provide end‑to‑end event analysis, incident detection and manage escalations using documented procedures.
- Devise and document new procedures and runbooks/playbooks as directed.
- Maintain monthly Service Level Agreements (SLAs).
- Maintain compliance with processes, runbooks, templates and procedures‑based experience and best practices.
- Assist the Cyber Hunting team with advanced investigations as needed.
- Provide malware analysis (executables, scripts, documents) to determine indicators of compromise and create signatures for future detection of similar samples.
- Continuously improve the service by identifying and correcting issues or gaps in knowledge (analysis procedures, plays, client network models), false positive tuning, identifying and recommending new or updated tools, content, countermeasures, scripts, plug‑ins, etc.
- Perform peer reviews and consultations with Level 1 Analysts regarding potential security incidents.
- Serve as a subject matter expert in at least one security‑related area (e.g., specific malware solution, Python programming, etc.).
- Provide shift status and metric reporting as well as support weekly operations calls.
- Strong understanding of SOC operations, incident response workflows and monitoring tools.
- Experience with malware behavior analysis and identification of indicators of compromise.
- Familiarity with APT tactics, techniques and procedures.
- Knowledge of security technologies such as SIEM, EDR, IDS/IPS and WAF.
- Understanding of networking fundamentals, protocols (TCP/IP, DNS, HTTP) and infrastructure devices.
- Awareness of security architecture principles and common defensive tools.
- Bachelor’s degree.
- 2+ years of working in a SOC or similar security operations environment, including 1+ years of experience in security technologies such as SIEM, IDS/IPS, DLP, EDR, WAF, anti‑virus, sandboxing solutions, firewalls, threat intelligence platforms or penetration testing tools.
- One or more of the following certifications: (ISC)2 CISSP, GIAC GCIA, GIAC GMON, CEH or equivalent.
- Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
- Must have the ability to work shifts on a rotating basis for 24/7 support of clients.
- Travel up to 15%, on average, based on the work you do and the clients and industries/sectors you serve.
- Applicants must currently hold and maintain an active DOE Q or equivalent DoD Top Secret clearance.
- A strong desire to understand the what as well as the why and the how of security incidents.
- Knowledge of Advanced Persistent Threats (APT) tactics, techniques and procedures.
- Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc.
- Understanding of common network infrastructure devices such as routers and switches.
- Understanding of basic networking protocols such as TCP/IP, DNS, HTTP.
- Basic knowledge in system security architecture and security solutions.
- Onsite (Las Vegas, NV).
Referrals increase your chances of interviewing at ShorePoint Inc by 2x.
#J-18808-LjbffrTo View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×