Overview
Ready to detect, respond, and contain threats before they escalate?
Join a cybersecurity solutions provider recognised for delivering advanced identity, threat detection, and SOC services. With a reputation for innovation and trusted partnerships, the organisation continues to help enterprises defend against evolving cyber risks.
The team is hiring an L2 SOC Analyst to monitor, investigate, and respond to security incidents. The role will focus on analysing alerts, performing in-depth investigations, escalating complex threats, and supporting continuous improvements in SOC processes and tools.
Be the frontline defender where speed meets precision. Apply now!
Responsibilities
- Investigate escalated security incidents and determine root causes.
- Conduct in-depth analysis of incidents using threat intelligence (IOCs, TTPs) alongside host, network, and identity data sets.
- Leverage SIEM platforms (Crowdstrike SIEM, Splunk, Microsoft Defender) to develop and implement new use cases.
- Tune and reduce false alerts.
- Lead investigations through resolution.
- Monitor and analyze events across multiple operating systems (Windows, macOS, Linux).
- Conduct proactive threat hunts across diverse data sources (host, vulnerability, threat, network, Active Directory).
- Collaborate with stakeholders to coordinate timely incident response efforts.
- Design and implement incident response plans, including alert definitions, escalation workflows, and runbooks.
- Produce clear and comprehensive incident documentation tailored to both technical and management audiences.
- Perform forensic investigations as needed.
- Partner with vendors to implement new SOC use cases.
Requirements
- 5+ years of recent experience as a Tier 2 or 3 SOC Analyst in a large organization (government or critical infrastructure experience preferred).
- Strong expertise with SIEM tools, including Crowdstrike, Splunk, and Microsoft Defender.
- Proven track record designing and implementing SOC use cases and response runbooks.
- Demonstrated ability to conduct advanced correlation analysis across diverse security data sources.
- Experience leading complex investigations and collaborating with cross-functional teams.
- Strong experience setting up alert rules and managing alert workflows.
- Excellent documentation skills for technical and executive-level reporting.
- Proactive, curious, and analytical problem solver.
- Strong qualitative and quantitative analysis abilities.
- Adaptive and resilient in fast-paced, dynamic environments.
- Excellent communication and stakeholder engagement skills.
Salary: €350 per day