SOC Analyst II

This is a full-time position. Standard business hours are Monday through Friday 8:30 AM to 5:30 PM. We are seeking a highly skilled and experienced L2 SOC Analyst to join our Security Operations Center (SOC). This fully remote role is critical to our mission of protecting our clients from cybersecurity threats. The L2 SOC Analyst will be responsible for monitoring and analyzing security events, identifying and investigating potential security threats, and responding to security incidents.

Responsibilities

  • Monitor and analyze security events utilizing advanced security technologies and tools such as Microsoft Sentinel, Defender technologies, and Log Analytics.
  • Utilize deep threat intelligence to identify and investigate potential security threats.
  • Respond to and triage security incidents, escalating as necessary.
  • Utilize proficiency in KQL Queries to conduct investigations and gain insights into potential security threats.
  • Collaborate with other teams to resolve security incidents and improve overall security posture.
  • Participate in incident response efforts and assist in forensic investigations, adhering to NIST guidelines.
  • Continuously improve security operations through the identification of trends and anomalies.
  • Communicate security incidents and findings to stakeholders and management.
  • Willingness to work in a 24/7 environment.
  • Experience working in government environments.
  • Familiarity with incident response requirements based on NIST guidelines.
  • Proficient in implementing and utilizing Microsoft Sentinel for Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) concepts.
  • Experience in using Azure Sentinel to detect and respond to security threats, anomalies, and to automate incident response.
  • Experience with techniques utilizing the MITRE ATT&CK framework for incident investigation and threat hunting.
  • Experience in conducting investigations and identifying malicious activities using techniques such as packet analysis, log analysis, and endpoint forensics.
  • Experience with scripting languages such as Python, PowerShell, and JavaScript.

 

Job Category: Security Operations Center
Job Type: Full Time

Apply for this position

Allowed Type(s): .pdf, .doc, .docx