Qureos

Find The RightJob.

This role is no longer accepting applications.

SOC Tier II Analyst, Advanced Investigation | WINTrio LLC

Job Expired

Company Overview

WINTrio LLC (WINTrio) is a leading provider of Cyber/DevSecOps, Cloud, Artificial Intelligence (AI)/Machine Learning (ML), and Agile Software Development solutions. We collaborate closely with federal and commercial clients to solve complex technical challenges by delivering innovative, agile, and cost-effective solutions. Our team is empowered to think creatively and deliver impactful results that drive measurable value.

Role: SOC Tier II Analyst
Location: Remote
Client: Long-term Federal/Public Sector
Work Authorization: US Citizen or Green Card preferred; must be able to pass federal background and suitability requirements.

Job Summary:
As a SOC Tier II Analyst, you will perform advanced investigation of escalated alerts and incidents across Microsoft Sentinel, Microsoft Defender, identity, cloud, endpoint, email, network, SQL, GitHub, and backup environments. This role requires strong analytical ability, KQL skills, incident documentation, and the ability to distinguish real security threats from noise and false positives.

Key Responsibilities:

  • Investigate escalated alerts from Tier I analysts and automated enrichment workflows.
  • Conduct event correlation across Sentinel, Defender XDR, Entra ID, AWS, firewalls, VPN, Proofpoint, GitHub, SQL, and endpoint telemetry.
  • Use KQL to query, validate, and enrich security events.
  • Analyze suspicious login activity, MFA failures, endpoint detections, lateral movement, malware, phishing, data exfiltration, and administrative changes.
  • Document investigation steps, findings, containment recommendations, and escalation decisions.
  • Support monthly threat hunting activities and use case validation.
  • Recommend tuning changes to reduce false positives and improve detection accuracy.
  • Support incident response, reporting, purple team exercises, and post-incident lessons learned.

Required Qualifications:

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field, or equivalent experience.
  • 5+ years of SOC, cybersecurity operations, incident response, threat monitoring, or SIEM investigation experience.
  • Hands-on experience with Microsoft Sentinel and KQL.
  • Experience investigating endpoint, identity, cloud, phishing, network, and privileged access events.
  • Strong understanding of MITRE ATT&CK, NIST incident response lifecycle, and federal cybersecurity practices.
  • Ability to write clear, actionable investigation summaries for technical and non-technical audiences.

Tools and Preferred Qualifications:

  • Microsoft Sentinel, Defender XDR, MDE, MDI, Entra ID, AWS CloudTrail, VPC Flow Logs.
  • Proofpoint TAP/TRAP, Cisco, Checkpoint, iBoss, VPN, GitHub, SQL Server auditing, Veeam.
  • Certifications preferred: GCIH, GCIA, CySA+, CEH, SC-200, CISSP, Security+.

Benefits

  • Medical, Dental, and Vision Insurance
  • FSA & HSA options
  • 401(k) Retirement Plan
  • Annual Bonus & Profit Sharing
  • Paid Time Off (PTO) & Vacation
  • Employee Assistance Program (EAP)
  • Life & Disability Insurance

Why Join WINTrio?

WINTrio is a people-first, employee-driven organization. We offer opportunities to grow across emerging technologies, program management, and business development while working on high-impact federal initiatives.

Equal Opportunity Employer

WINTrio LLC is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration without regard to race, color, religion, sex, gender identity, national origin, age, veteran status, or disability.

Similar jobs

No similar jobs found

© 2026 Qureos. All rights reserved.