Job Title:
SOC Analyst – Level 2 (Threat Hunting OR Vulnerability Management)
Role Summary
We are seeking an experiencedSOC L2 Analyst with strong capabilities in threat hunting and / or vulnerability management, and advanced security operations. The ideal candidate will have hands-on expertise with Qualys or Tenable, strong operational experience in Palo Alto Cortex (XDR/XSIAM), Microsoft Sentinel, and working knowledge of Nozomi Networks (OT/ICS security monitoring).
Key Responsibilities
Perform advanced incident investigation, triage, and response across IT and OT environments
Conduct proactive threat hunting using SIEM/XDR platforms
Manage and remediate vulnerabilities using Qualys or Tenable
Correlate alerts and telemetry within Microsoft Sentinel and Palo Alto Cortex
Monitor and analyze OT network traffic using Nozomi Networks
Develop and tune detection rules, playbooks, and automation workflows
Support incident containment, eradication, and root cause analysis
Produce technical reports and executive summaries
Required Skills & Experience
3–6 years of SOC experience (L2 level)
Proven threat hunting experience
Hands-on vulnerability management experience (Qualys / Tenable)
Strong experience with Palo Alto Cortex XDR/XSIAM
Operational experience with Microsoft Sentinel (SIEM)
Experience monitoring OT/ICS environments using Nozomi Networks
Working knowledge of Solarwinds
Understanding of Maximo IT
Knowledge of MITRE ATT & CK framework
Experience With SOAR Automation Preferred
Any experience within Gov, road maintenance, traffic management a bonus
Preferred Certifications
CEH, GCIA, GCED, SC-200, PCNSE, or equivalent + PA Cortex / XDR
Skills: solarwinds,ceh,sc-200,gced,qualys,xsiam,ot/ics,xdr,soar,tenable,maximo it,pcnse,nozomi networks,siem,gcia