About the job SOC Analyst Tier 2
SOC Analyst Tier 2 - Contract Position
Responsibilities
- Provide technical escalation point for Tier 1 Analysts on security incidents, alerts, and inquiries requiring input on security risk, privacy, or threats.
-
Be available to assist Tier 1 Analysts with critical incidents and serve as a reference for alerts and inquiries.
-
Perform analysis of log files.
-
Conduct log analysis for suspicious events.
-
Feed data back to threat intelligence sources when new threats are discovered during investigations.
-
Take an active role in incident containment, including post-escalation phases.
-
Assist Tier 3 Analysts with system breach investigations.
-
Assist Tier 3 Analysts with high-tier incidents.
-
Act on vulnerability findings by opening incident tickets against affected assets.
-
Proactively update systems to ensure latest patches are deployed.
-
Document remediation steps required during incident handling or vulnerability identification.
-
Record new incidents and corresponding resolution procedures.
-
Track remediation tickets to support a closed-loop process.
-
Handle client requests and track them through to fulfillment.
-
Manage whitelists and blacklists in SIEM; disseminate updates to appropriate operators for tool or policy updates.
-
Manage and block suspicious IPs in Azure Sentinel.
-
Update work procedures and documentation.
-
Issue documentation and proactively contact system asset owners post-incident to confirm resolution.
Experience
-
Strong knowledge and hands-on experience with SIEM solutions, including QRadar, McAfee ESM, and Azure Sentinel.
-
3 to 5 years of IT Infrastructure Support experience.
-
Additional 2 to 3 years of experience as a Tier 2 SOC Analyst or Threat Hunter (Red Teaming) in an established SOC.
-
Advanced knowledge of network technologies (protocols, design concepts, access control).
-
Advanced knowledge of security technologies (firewalls, web gateways, endpoint protection, vulnerability management, network infrastructure, etc.).
-
Advanced technical and problem-solving skills in IT infrastructure.
-
Solid experience with email security solutions.
-
Strong background in vulnerability management.
-
Good understanding of the MITRE ATT&CK framework.
-
Good understanding of the ITIL Framework.
-
Proficient in using support ticketing systems and achieving SLA targets.
-
Familiarity with risk management and quality assurance controls.
-
Excellent interpersonal skills and professional demeanor.
-
Excellent verbal and written communication skills.
-
Proficient in Microsoft Office applications.
-
Eligible to obtain National Security Clearance.
-
Excellent customer service capabilities.
Qualifications
-
Grade 12 certificate.
-
ITIL Foundation qualification.
-
Certified Ethical Hacker (CEH).
-
Azure Sentinel SC-200 certification.
-
Azure Sentinel AZ-500 certification.
-
Degree or diploma in Computer Technology.
-
CompTIA A+, Network+, Security+.
-
CompTIA CySa+ and CASP+ (advantageous).