Job Description
SOC Analyst L2
We are seeking a SOC Analyst with strong skills in
SOC Monitoring, Threat Intelligence, and Threat Hunting to enhance our security operations and proactively defend against cyber threats.
Key Responsibilities
- Monitor and analyse security alerts through SIEM tools.
- Perform incident triage, investigation, and response.
- Conduct threat hunting using MITRE ATT&CK and behavioural analytics.
- Gather, analyse, and operationalize threat intelligence (IOCs/TTPs).
- Build and refine detection rules, dashboards, and use cases.
- Analyse logs from endpoints, servers, network devices, and cloud environments.
- Prepare incident reports and support continuous improvement of SOC processes.
Required Skills
- Experience with SIEM tools (Azure Sentinel).
- Hands-on with FortiSIEM/FortiSOAR/Google SecOps platforms.
- Knowledge of TCP/IP, DNS, HTTP, Windows/Linux logs.
- Understanding of malware behavior, threat actors, and attack lifecycle.
- Familiarity with MITRE ATT&CK, NIST IR framework.
- Basic scripting (Python / PowerShell) is a plus.
Preferred
- Certifications: Security+, CEH, CySA+, or equivalent.
- Experience with TI platforms (MISP, Anomali, etc.).
- Exposure to SOAR, cloud security monitoring.