We are seeking a skilled and experienced SOC L2 analyst to join our growing team. As a SOC L2 Analyst, you are responsible for advanced threat detection, investigation, and response within a Security Operations Center (SOC). This role involves analyzing security alerts, conducting in-depth incident investigations, and supporting L1 analysts in handling complex security events.
Responsibilities
- Threat Monitoring & Analysis
- Investigate security alerts escalated from L1 analysts and determine their severity.
- Perform deep-dive analysis on security events using SIEM, EDR, and other security tools.
- Correlate data from multiple sources to identify patterns of cyber threats.
- Conduct malware analysis, log analysis, and forensic investigation as needed.
- Incident Response & Threat Mitigation
- Lead incident response efforts for complex security incidents.
- Contain, eradicate, and recover from security breaches in coordination with IT teams.
- Provide recommendations for improving security posture based on investigation findings.
- Document findings and contribute to post-incident reviews and lessons learned.
- Threat Intelligence & Detection Enhancement
- Working with threat intelligence feeds to understand emerging cyber threats.
- Assist in tuning SIEM rules, IDS/IPS signatures, and detection mechanisms.
- Collaborate with L3 analysts and security engineers to improve detection capabilities.
- Security Tools & Process Improvement
- Manage and optimize security tools such as SIEM, EDR, firewall logs, and vulnerability scanners.
- Participate in threat hunting activities to proactively detect potential threats.
- Develop playbooks, use cases, and workflows to enhance SOC efficiency.
- Support & Training
- Mentor and assist L1 analysts in handling security incidents.
- Provide training and knowledge-sharing sessions to enhance SOC team skills.
- Stay updated on the latest cyber threats, attack techniques, and security technologies.
Competencies (Soft Skills)
- Communication skills
- Analytical skills
- Detail oriented
- Cooperation and Teamwork
- Active learning skills
- Time management
- Problem solving skills
- Positive Attitude
- Strong Work Ethic
Personnel specifications
- Diploma: Bachelor’s or master’s degree in computer science, Cybersecurity, Information Technology, or a related field.
- Experience: 3 years of practical experience in cybersecurity.
- At least 1 year of experience in Pre-sales engineer or cybersecurity engineer
Specific areas of expertise:
Technical Skills:
- Strong experience with SIEM tools (Splunk, IBM QRadar, ArcSight, etc.).
- Hands-on experience with EDR/XDR platforms (CrowdStrike, SentinelOne, etc.).
- Proficiency in analyzing network traffic, logs, and malware behavior.
- Understanding of security frameworks like MITRE ATT&CK, NIST, ISO 27001.
- Knowledge of scripting languages (Python, PowerShell, or Bash) is a plus.
- Experience with firewalls, IDS/IPS, and vulnerability assessment tools.
Certifications
- Internationally recognized certifications from leading cybersecurity vendors such as Fortinet, CyberArk, Splunk, Forcepoint, CompTIA etc. are preferred.
Language Skills
- Azerbaijani (required)
- English (required)
Salary: upon the interview
Interested candidates can send their CV to the e-mail address in the Apply for job button by mentioning SOC L2 Analyst in the subject line.