Security Analyst II
Job Type
Full Time
Experience
3+
Location
Remote
Job Description
We are seeking an experienced Level 2 Security Analyst to join our Security Operations Center (SOC). In this role, you will serve as an escalation point for analysts, investigate complex security incidents, and play a key role in protecting the organization's assets, data, and infrastructure. You will bring a deeper level of analytical skill and technical expertise to triage, containment, and remediation efforts.
Key Responsibilities
Investigate and respond to complex security incidents, ensuring timely containment, eradication, and recovery.
Serve as an escalation point for Level 1 analysts, providing guidance and technical expertise.
Monitor and analyze security alerts using SIEM and endpoint security tools to identify potential threats.
Conduct proactive threat hunting and identify Indicators of Compromise (IOCs) across systems and networks.
Tune and enhance detection rules to reduce false positives and improve overall SOC efficiency.
Document incidents, prepare detailed reports, and collaborate with cross-functional teams to strengthen security posture
Qualifications
3–5 years of experience in a security operations or incident response role
Hands-on experience with CrowdStrike, DataDog, Defender
Strong understanding of networking fundamentals (TCP/IP, DNS, HTTP, firewalls, proxies)
Familiarity with the MITRE ATT&CK framework and common attack techniques
Experience analyzing malware, phishing campaigns, and intrusion attempts
Proficiency with endpoint detection and response (EDR) tools
Knowledge of operating systems (Windows, Linux) from a security perspective
Strong written and verbal communication skills
Preferred Qualifications
Relevant certifications such as CompTIA CySA+, CEH, GCIH, GCIA, or equivalent
Experience with cloud security (AWS, Azure, or GCP)
Scripting or automation skills (Python, PowerShell, or Bash)
Familiarity with SOAR platforms
Prior experience in a regulated industry (finance, healthcare, etc.)