top of page
exops-services-background.png

SOC Analyst – Level 2

Positions

POSITIONS

Find Your Next Career Adventure at Executive Operations, LLC

SOC Analyst – Level 2

Employment:

Full-time

Setup:

WFH

We are looking for a skilled and experienced Security Operations Center (SOC) Analyst Level 2 to join our cybersecurity team. As an SOC Analyst Level 2, you will be responsible for analyzing and responding to security incidents, providing advanced threat detection, investigation, and remediation. You will work with a team of SOC Analysts and security engineers to proactively identify potential security threats and manage incidents to mitigate risk to the organization. This role requires strong technical knowledge, problem-solving skills, and the ability to handle complex security issues.

Key Responsibilities

  • Advanced Incident Investigation: Lead the investigation and response to  security incidents, including analysis of logs, network traffic, and endpoint data to  identify potential threats and vulnerabilities.

  • Threat Hunting: Proactively search for signs of malicious activity, advanced  persistent threats (APTs), and other indicators of compromise (IOCs) across the  organization's systems and network.

  • Incident Escalation & Coordination: Coordinate with higher-level security teams  and management to escalate critical or high-severity incidents, ensuring timely and  effective remediation.

  • Root Cause Analysis: Perform root cause analysis for significant security  incidents, identifying underlying vulnerabilities and recommending preventive  measures to improve security posture.

  • Security Tools Optimization: Manage and fine-tune security tools and systems,  including SIEM (Security Information and Event Management), IDS/IPS, firewalls,  and endpoint protection solutions, to improve the detection of security threats.

  • Collaboration with IT & Engineering Teams: Work closely with IT, network, and  engineering teams to investigate security incidents and ensure the implementation  of appropriate technical controls to mitigate risk.

  • Documentation and Reporting: Ensure all incidents and investigations are  properly documented in the incident management system, including technical  details, investigation steps, actions taken, and final outcomes. Prepare reports for  management, highlighting incident trends and areas of improvement.

  • Security Awareness: Mentor and guide Level 1 analysts, providing support and  training to improve their technical capabilities and incident response processes.

  • Continuous Improvement: Regularly review and improve security processes and  incident response workflows, staying up to date with emerging cybersecurity  trends, threat intelligence, and industry best practices.

  • Compliance Support: Assist in ensuring the organization’s security operations  meet compliance requirements for industry standards and regulations (e.g.,  GDPR, PCI-DSS, HIPAA).

Requirements

  • Education: Bachelor’s degree in Cybersecurity, Information Technology,  Computer Science, or a related field (or equivalent work experience).

  • Certifications: Industry certifications such as CompTIA Security+, Certified  Information Systems Security Professional (CISSP), Certified Ethical Hacker  (CEH), or GIAC Security Essentials (GSEC) are preferred.

  • Minimum of 2-3 years of experience in a SOC or cybersecurity role, with a focus  on incident response, threat detection, and security monitoring.

  • Hands-on experience with SIEM tools (e.g., Splunk, QRadar, ArcSight) and  incident management systems.

  • Experience in analyzing network traffic, logs, endpoint data, and utilizing forensic  techniques to identify threats.

  • Knowledge of advanced malware analysis, threat intelligence, and vulnerability  management.

  • Proficient in network protocols (TCP/IP, HTTP, DNS, etc.), firewalls, IDS/IPS, and  endpoint security technologies.

  • Experience with scripting languages (e.g., Python, PowerShell, Bash) for  automation or investigation purposes.

  • Familiarity with threat intelligence platforms and the ability to analyze and act on  threat feeds.

  • Solid understanding of security frameworks (NIST, CIS, etc.) and incident  response methodologies (e.g., SANS, NIST).

  • Knowledge of forensic tools (e.g., FTK, EnCase) is a plus.

  • Strong problem-solving and analytical skills, with the ability to think critically under  pressure.

  • Excellent communication skills, both verbal and written, with the ability to convey  technical information to non-technical stakeholders.

  • Ability to manage multiple tasks simultaneously and prioritize effectively in a fast paced environment.

  • Strong team-oriented attitude with a collaborative approach to incident response  and problem-solving.

  • Hands-on experience with Tanium and CrowdStrike for endpoint security, threat  detection, and investigation

exops-homepage-position1.png
bottom of page