FIND_THE_RIGHTJOB.
JOB_REQUIREMENTS
Hires in
Not specified
Employment Type
Not specified
Company Location
Not specified
Salary
Not specified
OVERVIEW
A Level 2 Analyst is a subject matter expert responsible for managing threats, disseminating information, and handling, responding to and investigating all incident escalations from the Security Operations Center. Level 2 team members are responsible for coordinating with the CSIRT process when necessary and managing incidents throughout the event life cycle. Level 2 team members will further an investigation and ensure root cause and resolution for metrics, tracking, and lessons learned are compiled, documented, and disseminated in conjunction with the CIRT process.
They will provide insight and expertise to examine malicious code (malware), attack vectors, network communication methods, analyze threats against target systems and networks, determine target network capabilities and vulnerabilities, support development and maintenance of new tools and techniques to exploit specific targets, and produce technical after-action reports in support of the SOC. Level 2 members will be the focal point for critical security Alert, Events, and Incidents and will serve as subject matter experts in providing recommendations to the SOC Incident Manager and other members of Information Security and IT management for escalation and remediation. Level 2 Analysts are also responsible for training and mentoring their Level 2 and Level 1 peers to improve SOC Analyst capability. Finally, Level 2 members will work with the SIEM/SOAR Engineers to develop and refine use cases within Microsoft Sentinel focusing on emerging threats.
The SOC Analyst reports to the SOC Manager and works in conjunction with the other team members to keep projects delivered on time and within budget.
JOB REQUIREMENTS
Knowledge and Experience
To be successful in this position, a candidate should have at least two years of hands-on experience as a Level 2 SOC analyst leveraging Microsoft Sentinel, M365 Defender products, and Microsoft Defender for Cloud in production environments. Teamwork and collaboration skills will be critical for this role. The ideal candidate will have knowledge of and experience with the SOC framework and be confident in their ability to make recommendations to improve upon operations.
Certification Path
At a minimum, the Microsoft Security Operations Analyst (SC-200) and Microsoft Cybersecurity Architect (SC-100) certifications or the ability to get one within 180 days of being hired. Training materials provided and the cost of the relevant tests will be covered.
Within year one employment, one of the following or otherwise approved additional certifications will be obtained: ITIL, CISSP, GSEC, CISA, SEC+, CEH, CySA+, AZ-500, MS-500.
AREAS OF RESPONSIBILITY
The SOC Analyst must be able to perform the following duties unassisted or with some reasonable accommodation made by the organization:
Cybersecurity Operations:
Other
Similar jobs
The Jackson Laboratory
Farmington, United States
6 days ago
Sumitomo Group
New York, United States
6 days ago
Elyon International
Plantation, United States
6 days ago
Target
Minnesota, United States
8 days ago
Cargill
Texas, United States
8 days ago
© 2025 Qureos. All rights reserved.