Enable job alerts via email!

Security Operations Analyst

TieTalent

Calgary

On-site

CAD 60,000 - 80,000

Full time

Yesterday
Be an early applicant

Job summary

A dynamic cybersecurity firm in Calgary, Alberta is looking for a Level 2 SOC Analyst to join their Global Security Operations Center. The role focuses on monitoring security alerts, conducting in-depth analysis, and collaborating with internal teams. Candidates should have a background in cybersecurity, with certifications such as Security+ or CySA+ being a plus. This position offers a great opportunity to advance in the field of security operations and incident management.

Qualifications

  • Minimum 2 years experience in a SOC or similar environment.
  • Certifications such as Security+, CySA+, SSCP, CISSP are desirable.
  • Proficiency with security intelligence tools.

Responsibilities

  • Perform real-time monitoring of security alerts from various security controls.
  • Investigate escalated alerts from L1 Analysts within SLA guidelines.
  • Recommend technical and procedural improvements.

Skills

Incident Management
IT Security
Security Operations Center
Security Certification

Education

2+ year diploma or degree in Information Security or Cybersecurity

Tools

SIEM
IPS/IDS
Endpoint Security
Firewall
Cloud security
VirusTotal
Digital forensics tools

Job description

About

The Level 2 (L2) SOC Analyst is a core resource on the security monitoring and response team within the Global Security Operations Center (GSOC). As a member of the Security Operations Team, the L2 Analyst is responsible for monitoring, triage, and response to security alerts from SIEM and other security controls.

Responsibilities
  • Perform real-time monitoring of security alerts from various security controls.
  • Investigate escalated alerts from L1 Analysts within SLA guidelines.
  • Triage indicators and document findings in the threat knowledgebase.
  • Conduct in-depth analysis of alerts using endpoint and network analysis techniques.
  • Create security incidents from true-positive alerts and close false positives.
  • Escalate undetermined alerts to L3 Analysts.
  • Support Incident Handling and Incident Management teams.
  • Stay updated on industry trends, threats, and security standards.
  • Collaborate with GSOC and internal teams during investigations.
  • Recommend technical and procedural improvements to enhance SOC capabilities.
  • Report vulnerabilities and suggest mitigation strategies.
  • Review and update SOP documentation.
  • Contribute to internal threat intelligence efforts.
  • Perform shift handovers and review alert patterns for broader security issues.
  • Apply critical thinking and networking knowledge during investigations.
  • Utilize knowledge of Windows Event IDs, Linux commands, and vulnerability management.
  • Analyze logs and understand network security monitoring techniques.
  • Maintain awareness of threats, vulnerabilities, and attack methodologies.
  • Apply knowledge of ITSM, open source intelligence, and foundational malware analysis techniques.
  • Mentor junior analysts as needed.
Qualifications
  • 2+ year diploma or degree in Information Security or Cybersecurity is preferred but not required.
  • Certifications such as Security+, CySA+, SSCP, CISSP, etc., are desirable.
  • Minimum 2 years experience in a SOC or similar environment.
  • Experience with SIEM, IPS/IDS, Endpoint Security, Firewall, and Cloud security.
  • Proficiency with security intelligence tools like VirusTotal.
  • Experience with digital forensics and security reporting.
Skills
  • Incident Management
  • IT Security
  • Security Operations Center
  • Security Certification
Nice-to-have Skills
  • Linux
  • Scripting
  • Vulnerability Management
  • Windows
Location

Calgary, Alberta, Canada

Work Experience
  • Cyber Security Specialist
  • Pentester
  • Security Analyst
Languages
  • English
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.