Job Openings
L2 Incident Response Analyst
About the job L2 Incident Response Analyst
Key Responsibilities
- Perform deep-dive analysis on escalated alerts: correlate logs (SIEM), network traffic, endpoint (EDR), and threat intelligence
- Confirm scope, severity, and root cause; classify based on NIST/ISO 27035 guidelines
- Lead containment, eradication, and recovery steps (e.g., isolate endpoints, revoke credentials)
- Coordinate incident response war rooms and liaise with L1, L3, and business stakeholders
- Conduct post-incident reviews; document timelines, evidence, and lessons learned
- Recommend preventive controls and SOC improvements (playbook updates, SIEM rule tuning)
- Analyze Red Team findings, incorporate into IR playbooks, escalations, and detection logic
- Support tuning of SIEM (Sentinel preferred), EDR, and alerting thresholds
- Participate in cyber drills, tabletop exercises, and metrics review to enhance SOC maturity
- Maintain incident tickets and generate comprehensive incident reports including timeline, impact, root cause, and recommended mitigation
Person Specifications
- 3–5 years in security operations, incident response, or SOC Analyst roles
- Bachelors degree in Cybersecurity, Computer Science, or related field
- Certifications: GCIH, GCFA, GREM, CEH preferred
- Hands-on experience with SIEM tools (Microsoft Sentinel strongly preferred; Splunk, QRadar)
- Practical knowledge of EDR technologies, threat intelligence platforms, packet analysis, and forensic tools
- Experience working with Red Team or penetration test findings in strengthening SOC defenses
- Solid understanding of incident response lifecycle, threat actor tactics, and detection frameworks like MITRE ATT&CK
- Proficiency in log analysis, endpoint forensics, packet analysis (e.g., Wireshark), and IOC extraction
- Familiarity with IR frameworks and compliance standards (NIST, ISO 27035, GDPR/PDPA)
- Strong communication skills; capable of leading incident discussions and coordinating with diverse teams
Nice to have
- Scripting skills (Python, PowerShell) for automation and data analysis
- Threat hunting experience, analyzing Red Team reports for SOC enhancements
- Exposure to SOAR tools, vulnerability management, and cloud-native IR in Azure/AWS environments
- ITIL, ITSM, or incident management experience