Job Search and Career Advice Platform

Enable job alerts via email!

Security Operations Center (SOC) Analyst – Level 2 (L2)

Accenture Middle East

Riyadh

On-site

SAR 120,000 - 180,000

Full time

2 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A global security solutions provider is seeking a Senior Analyst for their SOC L2 team in Riyadh. This role involves advanced security monitoring, incident investigation, and response across client environments. Candidates should have 4–8 years of SOC operations experience and strong analytical skills, with hands-on experience in SIEM and EDR tools. The position offers opportunities for continuous learning and collaboration with cybersecurity experts across the company.

Benefits

Continuous learning opportunities
Career progression paths
Collaboration with global experts

Qualifications

  • 4–8 years SOC operations experience, particularly in security monitoring and incident response.
  • Strong familiarity with EDR and IDS/IPS technologies.
  • Ability to analyze large datasets across multiple sources.

Responsibilities

  • Lead security incident investigations and manage incident lifecycles.
  • Perform in-depth analysis of security alerts and logs.
  • Document investigations and prepare post-incident reports.

Skills

SIEM experience
Analytical skills
Incident management
Threat analysis
Cloud environment exposure

Education

Certifications such as GCIA, GCIH, or equivalent

Tools

Splunk ES
QRadar
Job description
Security Managed Service Senior Analyst

Accenture Middle East - Senior Analyst role in SOC L2.

Job Summary

The SOC L2 Analyst provides advanced security monitoring, incident investigation, and response across client environments. Requires strong analytical skills, hands‑on SIEM/EDR experience, and ability to manage escalated incidents from identification through remediation. Analyst interfaces with technical teams, drives SOC process improvements, and aligns defensive measures with emerging threats.

Key Responsibilities
  • Lead investigation of security incidents escalated from Level 1, validating initial analysis and identifying missing or inaccurate details.
  • Manage full incident lifecycle: identification, triage, containment, remediation, closure.
  • Perform in‑depth analysis of security alerts, logs, and events across SIEM, EDR, firewall, network, and cloud telemetry.
  • Conduct root‑cause analysis, document impact, provide actionable recommendations.
  • Support major incidents and complex investigations, ensuring timely and accurate escalation.
  • Analyze threat campaigns, attacker tactics, techniques, and procedures (TTPs), extract indicators of compromise.
  • Identify emerging threats and assess potential impact on client environments.
  • Tune detection rules, correlation logic, and use cases to enhance accuracy and reduce false positives.
  • Work with SIEM platforms (Splunk ES, QRadar, or equivalent) for advanced event analysis and correlation.
  • Utilize EDR, IDS/IPS, sandboxing tools, and other SOC technologies to perform comprehensive investigations.
  • Access and interpret elevated log sources across platforms including firewalls, endpoint logs, cloud services, and DNS telemetry.
  • Ensure all investigations and evidence are fully documented in case management systems.
  • Prepare post‑incident analysis reports with observations, lessons learned, and improvement recommendations.
  • Adhere to SOC processes, SLAs, and quality standards while contributing to their ongoing enhancement.
  • Coordinate closely with internal teams: SecOps, Network, Cloud, Platform Engineering, Threat Intelligence.
  • Engage resolver teams to support containment or remediation activities as required.
  • Communicate technical findings clearly to both technical and non‑technical stakeholders.
Experience & Qualifications
  • 4–8 years SOC operations, security monitoring, incident response.
  • Strong experience with SIEM, EDR, IDS/IPS, threat analysis tools.
  • Solid background in network security, log analysis, event correlation.
  • Exposure to cloud environments such as AWS, Azure, Google Cloud.
  • Understanding of network protocols, security architectures, endpoint behaviors.
  • Experience in threat hunting, IOC analysis, basic forensic triage.
  • Ability to analyze large datasets from multiple telemetry sources.
  • Certifications: GCIA, GCIH, GREM, CEH, GCFA, CISSP, Security+, or equivalent.
  • Strong written and verbal communication, work under pressure, analytical mindset.
Why Accenture Security

The role provides exposure to enterprise‑scale environments, complex cyber incidents, and advanced security technologies. SOC L2 Analysts benefit from continuous learning, defined career progression paths, and collaboration with global cybersecurity experts across Accenture’s delivery network.

Employment Details
  • Seniority level: Mid‑Senior level
  • Employment type: Full‑time
  • Job function: Project Management, General Business, Management
  • Industry: Security and Investigations
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.