SOC Analyst Level 2 role focusing on security incidents and response plans in a hybrid environment. Working with cross-functional teams to enhance security practices and incident handling.
Responsibilities
Monitor security events and alerts from various security tools such as SIEM, EDR and other security tools.
Respond to security incidents and perform incident triage to contain the incident and prevent further damage.
Develop and maintain security incident response plans and procedures.
Collaborate with other members of the security team to identify and implement security best practices and procedures.
Lead or assist in incident response activities, including containment, eradication, and recovery.
Work closely with other security and IT teams to coordinate and execute incident response plans.
Document incident details, actions taken, and lessons learned for continuous improvement.
Requirements
Bachelor's degree in Computer Science, Information Security, or a related field.
4+ years of experience working in a Security Operations Center or a similar role.
Strong knowledge of cybersecurity technologies such as SIEM, SOAR, IDS/IPS, firewalls, and endpoint protection/XDR.
Experience in writing playbooks and processes.
Strong knowledge of security & compliance frameworks such as NIST, ISO, and CIS.
Strong analytical and problem-solving skills.
Excellent communication and interpersonal skills.
Excellent knowledge of English language is required.
Ability to work effectively under pressure and prioritize tasks.
Certifications such as CISSP, GIAC, CEH, CSA and CompTIA Security+ will be considered a plus.
SOC Analyst II providing tier II cybersecurity support in a Security Operations Center environment. Conducting vulnerability assessments and analyzing cyber threats while training junior staff members.
Security Operations Analyst responsible for monitoring and responding to cybersecurity threats. Ensuring the confidentiality, integrity, and availability of data per compliance standards.
SOC Analyst responsible for cybersecurity incident management at Algosystems in Greece. Monitoring security threats, conducting investigations, and improving SOC services.
Cyber Operations Lead ensuring coordination of cyber operations between the Security Operations Center and internal business units. Enhancing security through effective incident response and threat management initiatives.
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.
SOC Analyst L2 responsible for managing and analyzing security incidents in digital transformation. Contributing directly to the protection of companies and infrastructures.
Senior Manager leading global IT security operations to protect company data and assets at Keenova. Overseeing incident response, monitoring, and cybersecurity capabilities with strategic oversight.