Roles & Responsibilities
About the Role
We are seeking a skilled and self-motivated Level 2 SOC Analyst to take a leading role in cyber threat operations within our MSSP SOC environment. This role also involves operating as a Subject Matter Expert (SME) and mentoring junior L1 analysts.
As a key member of our Security Operations Center, you will play a critical role in monitoring, detecting, investigating, and responding to security threats across a diverse range of client environments, including Government, Finance, Legal, Aviation, Logistics , and more. This diversity provides a unique opportunity to accelerate your growth as a threat analyst and incident responder .
As a senior analyst, you are expected to respond to high-priority escalated cases outside of standard working hours , as part of an on-call rotation or in urgent scenarios requiring expert intervention. Your involvement will play a pivotal role in ensuring timely intervention to cyber threats for our customers.
Key Responsibilities : -
Leadership
- Lead daily SOC operations, ensuring incident SLAs are met
- Mentor junior L1 analysts in triage methods, threat detection / validation and incident response
Threat Management
Able to perform proactive threat investigation & response using MITRE attack framework, NIST framework and other threat intelligence sourcesReview all escalations from L1 analysts, ensure comprehensive analysis and daily update to SOC ManagerIdentify and implement improvement to reduce false positives, ensuring SOC’s efficiencyTimely update to documentation, processes and workflows for continuous improvementTimely escalation to SOC Manager for qualified incident and attend War room including after office-hours when required.SIEM / SOAR / Ticketing and Incident Response
Design and enhance playbook, runbook and use cases based on investigations.Triage security events and incident response using playbook.Operate in-house SIEM for investigations and monitoringReview all cases within case management system and ensure proper incident tracking, escalation and resolution till case closureAble to lead the investigation in the event of threat, assisted by L1 Analyst, and provide timely update to SOC ManagerCyber Threat Intelligence
Research in threat intelligence to strengthen SOC capabilities for detecting cyber-attacks.Share threat intelligence news and keep abreast of latest cyber news so that the team is informed about new threats and attack methodsSecurity Operations Excellence
Improve standard operating procedures (SOP)Compile and present monthly SOC threat reports and gap analysis to customersImprove SOC processes on an ongoing basisMonitor SOC workflow and suggest improvementsWho We're Looking For
Required
Diploma or Degree in Computer Science, or related field.MUST have at least 2 years of experience working in MSSP SOC or 3 years experience working in in-house SOC.Experience with tools such as SIEM, EDR, NDR, XDR, IDS, IPS, Firewalls, Email Security and Web Security.Good understanding of computer networking, TCP / IP, subnets, routing and switching.Experience in security event analysis, incident handling, root cause analysis.MUST have either one of them : - CCNA, Comptia Network+, Comptia Security+, ISC2 CC, EC-Council C|ND, EC-Council E|CIH, EC-Council C|SAExperience and knowledge in Cloud Environments such as AWS, GCP, Azure, Alibaba Coud, will be an added advantage.Strong analytical and problem-solving skills, with the ability to quickly identify and resolve security issues.MUST be willing to be on stand-by after office-hours on rotational basis for any threat escalation by L1 Analyst.Tell employers what skills you have
Mentoring
Leadership
Security Operations
Ticketing
CCNA
IDS
Investigation
Root Cause Analysis
IPS
Routing
SoC
Networking
Threat Management
Web Security
Threat Intelligence
Case Management