Tier 2 SOC Analyst
Elevate Your Cybersecurity Career at Cybrella
Are you an experienced SOC Analyst looking to take on advanced security monitoring, threat detection, and incident response? Cybrella is seeking a Tier 2 SOC Analyst to analyze, escalate, and contain cyber threats in real-time. You will work with cutting-edge security tools, conduct in-depth investigations, and support incident response efforts to strengthen our security operations. If you have a strong foundation in SIEM monitoring, log analysis, and security investigations, this is your opportunity to grow and make an impact!
Your Role at Cybrella
As a Tier 2 SOC Analyst, you will be the first escalation point for security incidents detected by Tier 1 analysts. You will analyze security alerts, validate threats, and conduct forensic investigations to determine the severity of incidents. You will also be responsible for incident response coordination, developing detection rules, and mentoring Tier 1 analysts to improve the overall efficiency of the Security Operations Center (SOC).
What You’ll Do
- Investigate and validate escalated security alerts from Tier 1 analysts, determining the severity and impact of potential threats.
- Conduct deep log analysis, network traffic monitoring, and endpoint security investigations using SIEM and EDR tools.
- Escalate confirmed security incidents to Tier 3 analysts and Incident Response teams when necessary.
- Assist in threat hunting activities, proactively searching for indicators of compromise (IOCs) and suspicious behavior.
- Support incident response efforts, participating in containment, remediation, and recovery activities.
- Create and refine SIEM correlation rules, threat detection use cases, and automation scripts to improve threat detection capabilities.
- Contribute to incident response playbooks and provide recommendations for improving SOC workflows.
- Mentor Tier 1 analysts, providing training and guidance on alert triage, analysis techniques, and threat intelligence.
- Stay up to date with the latest attack techniques, threat actor behaviors, and security vulnerabilities.
What We’re Looking For
We need a highly analytical SOC Analyst with a strong background in security monitoring, threat detection, and log analysis. You should have hands-on experience with SIEM platforms, intrusion detection tools, and forensic analysis techniques.
Must-Have Skills & Experience:
- 2-4 years of experience in a SOC, threat intelligence, or security monitoring role.
- Strong understanding of SIEM platforms (Splunk, QRadar, ArcSight, Sentinel) and endpoint security tools (CrowdStrike, Carbon Black, SentinelOne).
- Experience in log analysis, network traffic monitoring, and IDS/IPS alert investigations.
- Familiarity with incident response procedures, malware analysis, and digital forensics.
- Knowledge of MITRE ATT&CK framework, threat intelligence, and adversary tactics.
- Understanding of firewalls, VPNs, intrusion detection systems (IDS), and proxy logs.
- Ability to triage, escalate, and contain cyber incidents in real-time.
Bonus Skills (Nice to Have):
- Experience with SOAR platforms (Cortex XSOAR, Splunk Phantom) for automated response.
- Scripting experience with Python, PowerShell, or Bash to automate security tasks.
- Familiarity with cloud security monitoring (AWS, Azure, GCP).
- Security certifications such as GCIH, GCIA, CEH, Security+, or CySA+.
Why Cybrella?
At Cybrella, we provide a fast-paced, collaborative security environment where you’ll have the opportunity to analyze real-world cyber threats and enhance security defenses. As a Tier 2 SOC Analyst, you’ll work alongside seasoned cybersecurity professionals, develop new skills, and take on advanced threat detection challenges.
If you’re ready to level up your SOC career and work in a cutting-edge security environment, apply today and become a critical part of Cybrella’s security operations team!