Job Description
Level 2 and Level 3 SOC Analyst Openings
Responsibilities:
• Monitor and analyze security alerts from SIEM, EDR, and other security platforms to identify potential threats.
• Perform in-depth investigation of suspicious activity, correlating data across multiple sources to determine scope and impact.
• Lead the resolution of low to moderately complex security incidents, including containment, eradication, and recovery actions.
• Escalate confirmed incidents to L3 analysts or incident response teams with detailed documentation and recommendations.
• Support containment and remediation efforts during active incidents.
• Conduct initial root cause analysis and contribute to post-incident reviews to identify gaps and improve future response efforts.
• Leverage threat intelligence, behavioral analytics, and contextual data to enhance detection, investigation, and resolution capabilities.
• Collaborate with detection engineering teams to develop, test, and tune detection rules and use cases.
• Perform basic malware analysis, log correlation, and network traffic inspection to support incident resolution.
• Maintain up-to-date knowledge of the threat landscape, including attacker tactics, techniques, and procedures (TTPs), and apply this knowledge to improve incident handling.
• Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate incident resolution efforts.
• Document investigation steps, findings, and resolution actions in a clear, structured, and timely manner.
• Participate in SOC shift rotations to ensure 24/7 monitoring and rapid response to security events.
• Contribute to the continuous improvement of SOC processes, playbooks, and knowledge base, with a focus on enhancing incident resolution workflows