The SOC Analyst (Level 2) will be a key member of our Security Operations Center, focusing on advanced security monitoring, incident response, threat analysis, and continuous improvement of SOC detection and response capabilities.
Requirements
- 3–4 years of experience in the SOC field, with at least 2 years in a Level 2 or Level 3 position
- BSc or MSc in Computer Science, Information Systems, or Information Security
- Strong proficiency in incident management and incident response processes
- Experience with security device management and SIEM platforms (knowledge of IBM QRadar will be considered a strong advantage)
- Hands-on experience in threat hunting, SOAR orchestration, and integration of SIEM with EDR/XDR platforms
- Experience with Python or PowerShell scripting for custom detection and automation
- In-depth knowledge of cyberattack techniques, threat vectors, risk management, and incident response methodologies
- Experience in threat management and threat intelligence analysis
- Knowledge of operating systems including Windows, Linux, and Unix
- Understanding of applications, databases, and middleware security considerations
- Proficient in the preparation of technical reports, dashboards, and operational documentation
- Excellent communication and coordination skills
- Ability to handle high-pressure situations and interact effectively with key stakeholders
- Strong analytical, problem-solving, and interpersonal skills
- Working knowledge of Microsoft Office tools with strong proficiency in Excel
Benefits
- Competitive remuneration package
- Private medical and life insurance
- Training and development opportunities within a market-leading, fast growing organization
- Exposure to a multinational environment and global teams
- A collaborative and inclusive workplace culture focused on innovation and growth