¡Activa las notificaciones laborales por email!

Security Technology Analyst

Devoteam

Madrid

Híbrido

EUR 40.000 - 60.000

Jornada completa

Hoy
Sé de los primeros/as/es en solicitar esta vacante

Descripción de la vacante

A leading IT company in Europe is seeking a Level 2 Security Analyst for its Security Operations Center (SOC). The ideal candidate will have experience with SIEM/SOAR solutions, strong analytical skills, and a proactive mindset. This hybrid role involves analyzing security alerts, operating security tools, and contributing to continuous improvement efforts. Competitive salary and career growth opportunities offered.

Servicios

Opportunities for further training and specialization
Access to an international network of specialists
Supportive and inclusive workplace culture

Formación

  • 2-4 years of experience in SOC operations, with at least 1 year in an L2 role.
  • Hands-on experience with SIEM/SOAR platforms.
  • Proficiency in query languages: KQL, SPL, or SQL.

Responsabilidades

  • Analyze and investigate medium to high-complexity security alerts.
  • Perform root cause analysis on complex incidents.
  • Design, implement, and optimize detection use cases.

Conocimientos

Fluent English (C1 / C2 level)
Experience in SOC operations
Hands-on experience with SIEM/SOAR platforms
Query languages: KQL, SPL, SQL
Knowledge of networks and protocols
Scripting skills: Python, PowerShell, Bash

Herramientas

Google Chronicle SecOps
Palo Alto XSIAM
CrowdStrike Falcon Next-Gen SIEM
Microsoft Sentinel
Descripción del empleo
Job Description

Imagine being part of one of the most successful IT companies in Europe. Turn imagination into reality and apply for this exciting career opportunity in Devoteam.

L2 SECURITY ANALYST

We are seeking a Level 2 (L2) Security Analyst for our Security Operations Center (SOC), with solid experience in SIEM / SOAR solutions, especially Google SecOps, CrowdStrike NG-SIEM and Microsoft / AWS / GCP ecosystems. The ideal candidate will have extensive experience in creating threat detection use cases, and deep knowledge of EDR / XDR technologies and networks / communications.

MAIN RESPONSIBILITIES
Detection and Response

Analyze and investigate medium to high-complexity security alerts, with a goal of resolving 80% without escalation to L3

Perform root cause analysis on complex incidents, documenting findings and recommendations

Coordinate incident responses involving multiple systems and cloud platforms

Detection Engineering

Design, implement, and optimize detection use cases based on MITRE ATT&CK

Tune correlation rules in SIEM and detection policies in EDR/XDR to reduce false positives

Validate and test new detections before production implementation

Platforms and Tools

Operate and manage Google Chronicle SecOps, CrowdStrike Falcon Next-Gen SIEM and PaloAlto XSIAM as primary platforms

Manage detections in Microsoft 365 Defender, Azure Sentinel, and AWS Security Hub

Utilize PaloAlto Cortex XSIAM for threat analysis and investigations

Continuous Improvement

Develop automation scripts (Python / PowerShell) for repetitive tasks and alert enrichment

Mentor and provide technical support to L1 analysts

Contribute to technical documentation, playbooks, and operational procedures

Participate in proactive threat hunting exercises

TECHNICAL REQUIREMENTS
Essential

Fluent English (C1 / C2 level) - both written and verbal communication

2-4 years of experience in SOC operations, with at least 1 year in an L2 role

Hands-on experience with at least twoof these SIEM / SOAR platforms "Google Chronicle SecOps","Palo Alto XSIAM","CrowdStrike Falcon Next-Gen SIEM", "Microsoft Sentinel"

Demonstrable experience with EDR / XDR solutions (CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne, Cortex XDR or Sophos)

Proficiency in query languages : KQL (Kusto), SPL (Splunk), or SQL

Strong knowledge of networks and protocols : TCP / IP, DNS, network traffic analysis

Experience in Microsoft 365 environments (Exchange Online, Azure AD, Defender)

Highly Valued

Hands-on experience with PaloAlto Cortex XSIAM, Google Secops, CrowdStrike NG-SIEM

Scripting / automation skills : Python, PowerShell, or Bash

Experience developing detection use cases based on frameworks (MITRE ATT&CK)

Familiarity with threat intelligence platforms (SOCRadar, Google GTI, MISP)

Certifications (Optional but Valued)

Platform-specific certifications : Microsoft Security Operations Analyst (SC-200), CrowdStrike Certified Falcon Administrator, or Google Chronicle Security Operations

GIAC : GCIA, GCIH, or GCFA

CompTIA Security+ or CySA+

Certified SOC Analyst (CSA) from EC-Council

Professional Competencies

Analytical capacity and critical thinking for complex investigations

Excellent written communication for clear technical documentation

Verbal communication skills to explain technical incidents to non-technical audiences

Service orientation and ability to interact professionally with internal clients

Effective time management and prioritization under pressure

Proactive mindset and oriented towards continuous improvement

Collaborative work and willingness to share knowledge

Employment Conditions
Contract Type

Permanent full-time position

Work Model

Hybrid (Barcelona)

On-Call rotations

WHAT YOU CAN LOOK FORWARD

A challenging and exciting career with an international perspective and opportunities

High level of trust and competency to make your own decisions

A warm and talented culture with a focus on business, but knowing that family always comes first

Access to international network of specialists within the organization to build your rep and skills

At Devoteam we have created a culture of honesty and transparency, inclusion, and cooperation which we value a lot. We are looking for colleagues, who are highly motivated and proactive, not afraid of challenges. We are highly invested in the career path development of our employees, and we offer and support possibilities for further training, certification, and specialization.

Consigue la evaluación confidencial y gratuita de tu currículum.
o arrastra un archivo en formato PDF, DOC, DOCX, ODT o PAGES de hasta 5 MB.