Job Description
Position: SOC IT Asset Discovery and Recognition Level 2 - Process Improvement and Development;
Overview:
We seek a skilled and experienced SOC Analyst Tier 2 to join our dynamic cybersecurity team. In this role, you will play a pivotal part in our Security Operations Center (SOC), focusing on data gathering, incident analysis, and process development to enhance our security posture. If you have a passion for cybersecurity and are ready to take on challenging responsibilities, we encourage you to apply.
Responsibilities:
- Gather and analyze data from IT infrastructure, networks, applications, and APIs to improve security.
- Recognize and identify IT assets and application logic.
- Serve as an escalation point for Tier 2 analysts.
- Perform threat hunting and develop use cases as needed.
- Define and enhance playbooks for responding to cyber threats.
- Develop security analysis processes.
- Provide teaching and mentoring to both experienced and junior analysts.
- Execute additional tasks as assigned by the SOC Head of Department.
Work Location:
Working Hours:
- Day shift;
- On-call availability (some nights, weekends, and holidays);
Requirements:
- 6 years of experience in roles such as CIRT, CERT, CSIRC, or SOC.
- Bachelor’s degree in Computer Science, Information Technology, or a related technical field.
- Experience with SIEM systems, antivirus solutions, intrusion detection systems, firewalls, and large enterprise or cloud environments.
- Proficient in incident response, network traffic analysis, and log analysis.
- Familiarity with NIST Incident Response Lifecycle, Cyber Kill Chain, or ATT&CK framework.
- Experience with XDR/EDR, deep packet and log analysis, and basic forensic/malware analysis.
- Skills in cyber threat intelligence gathering and analysis.
Skills:
- Willingness to learn, adapt, and innovate.
- Strong critical thinking and analytical skills.
- Excellent written and verbal communication skills.
- Great interpersonal and teamwork skills.
- Proficiency in incident management and response.
- Experience with security device management and SIEM.
- Knowledge of cyber-attack techniques, threat vectors, and risk management.
- Familiarity with various operating systems (Windows, Linux, Unix).
- Understanding applications and databases to address security threats.
- Proficient in preparing reports, dashboards, and documentation.