Qureos

Find The RightJob.

SOC Analyst Level 2

Perform in-depth investigation of escalated alerts (L2/L3 triage).

∙Analyze endpoint telemetry, network logs, and system artifacts.

∙Conduct malware analysis, log correlation, and threat pattern identification.

∙Create, tune, and optimize SIEM detection rules and dashboards.

∙Perform threat hunting exercises across environments using MITRE ATT&CK.

∙Develop and maintain incident response playbooks and standard operating procedures.

∙Collaborate with Threat Intel teams to integrate IOCs into SIEM/SOAR.

∙Provide mentorship and technical assistance to L1 analysts.

∙Participate in red team/blue team cyber defense exercises.

∙Produce detailed incident reports and post-incident reviews for management.

Preferred Certifications ∙CompTIA CySA+ (required) ∙EC-Council CSA (required) or any similar ∙EC-Council CEH (strongly preferred) ∙Any Reputable SIEM solution Administration certification

Job Type: Full-time

Education:

  • Bachelor's (Preferred)

Experience:

  • 5years: 3 years (Preferred)

Work Location: In person

Similar jobs

No similar jobs found

© 2026 Qureos. All rights reserved.