SOC Analyst L2We're looking for SOC L2 analysts with
4-7 years of hands-on experience in security monitoring and incident investigation
- Strong experience with SIEM-driven investigations and multi-source log correlation
- Ability to independently investigate escalated alerts and validate true incidents
- Experience executing response actions and containment steps using defined playbooks
- Capability to identify detection gaps and recommend tuning improvements
- Confidence guiding L1 analysts during live investigations
Qualification preference:Bachelor's in Computer Science, IT, Cybersecurity, or equivalent
Certification preference:Security+ / CEH / Blue Team equivalent, Splunk Enterprise Certified Admin
Responsibilities: - Perform detailed analysis of escalated security alerts and incidents
- Correlate events across SIEM data sources to validate threats
- Execute response actions using approved response scenarios and playbooks
- Conduct false-positive analysis and recommend detection tuning
- Prepare incident analysis and operational reports
- Support threat hunting and IOC-based investigations