SOC Analyst (L2)

3 months ago
Full-time
Mid Level
Cybersecurity
Protera

Protera

Protera Technologies modernizes, optimizes, and secures enterprise workloads in the cloud, offering proactive services to solve business challenges, optimize costs, and mitigate risks with transparency.

IT Services
251-1K
Founded 1998

Description

  • Monitor and analyze security alerts from SIEM, EDR, NDR, FIM, and antivirus platforms to detect potential threats.
  • Perform correlation and pattern analysis across multiple data sources to identify anomalies and sophisticated attack behaviors.
  • Continuously tune and optimize detection rules to reduce false positives and improve fidelity.
  • Execute the incident response lifecycle (triage, containment, eradication, recovery) following NIST standards and document incidents with root cause analysis and corrective actions.
  • Develop, maintain, and enhance incident response playbooks and runbooks and collaborate on SOAR playbooks for automated enrichment, containment, and notification workflows.
  • Align detection and playbook coverage with frameworks such as MITRE ATT&CK and the Cyber Kill Chain and support post-incident reviews to identify control gaps.
  • Conduct vulnerability assessments, evaluate system/network configurations for risk, and coordinate remediation with IT teams while tracking remediation metrics.
  • Manage and optimize security tooling (EDR, SIEM, SOAR, FIM, NDR, Antivirus), integrate data sources, and automate workflows to improve incident visibility and response time.
  • Monitor file integrity and endpoint protection, validate remediation and system cleanup, and perform proactive threat hunting using known TTPs and threat intelligence feeds.

Requirements

  • 4+ years of experience in SOC operations, cybersecurity, or incident response.
  • Strong knowledge of EDR, SIEM, SOAR, NDR, FIM, and Antivirus/NGAV platforms.
  • Experience writing and maintaining incident response playbooks, automating responses, and tuning detection logic.
  • Familiarity with incident handling frameworks, threat hunting, digital forensics, and performing deep-dive investigations using EDR/NDR/SIEM telemetry.
  • Framework knowledge: MITRE ATT&CK, Cyber Kill Chain, NIST IR, ISO 27001.
  • Preferred certifications: CompTIA Security+, CySA+, CEH, Microsoft SC-200, or equivalent.
  • Preferred tool exposure: SIEM (Splunk, Microsoft Sentinel, QRadar, Elastic); EDR/NDR (CrowdStrike Falcon, Defender for Endpoint, SentinelOne, Darktrace, Corelight); FIM/AV (Tripwire, Qualys FIM, Trellix/McAfee, Sophos, Bitdefender); SOAR (Cortex XSOAR, Splunk SOAR, Microsoft Sentinel Automation).
  • Strong communication and documentation skills for both technical and executive audiences and the ability to work effectively in high-pressure, time-sensitive environments.
  • Willingness and availability to work rotational 24x7 shifts in a remote work mode.

Benefits

  • Work-from-home set-up support
  • Comprehensive medical benefits
  • Gratuity, Provident Fund (PF), Employee Pension Scheme (EPS), bonus, and NPS
  • Shift allowances and on-call allowance
  • Health and wellness allowances
  • Learning and development allowances with a no-questions-asked certification policy
  • Certification bounty and bonus programs
  • Opportunities for professional development and training

Interested in this position?

Apply directly on the company website

Apply Now

Similar Roles

Cyber Threat Researcher

UltraViolet Cyber 501-1000 Computer and Network Security

UltraViolet Cyber is hiring a remote Cyber Threat Researcher to join its Threat Intelligence & Detection Engineering team and help defend customer environments through threat hunting, detection engineering, and threat intelligence analysis.

CrowdStrike Cybersecurity Elasticsearch PowerShell Python SIEM SOC
2 hours, 1 minute ago

Associate Cyber Threat Researcher

UltraViolet Cyber 501-1000 Computer and Network Security

UltraViolet Cyber is hiring a remote Associate Cyber Threat Researcher to support its Threat Intelligence & Detection Engineering team by hunting threats, developing detections, and helping customers strengthen defenses against modern cyber attacks.

CrowdStrike Cybersecurity Elasticsearch PowerShell Python SIEM
2 hours, 1 minute ago

Risk Analyst

Apogee Global RMS Professional Services

Apogee Global RMS is seeking contract Risk Analysts to research and produce analytical intelligence products for its Rogue Risk Analysis Group, supporting client advisories, briefings, and thought leadership across the firm's Nexus of Risk framework.

2 hours, 31 minutes ago

Jr. Identity Security Metrics Consultant & Databricks Analyst - Secret Clearance

TOMORROW HIRE Internet Software & Services

Junior Identity Security Metrics Consultant & Databricks Analyst for a remote U.S. role supporting enterprise identity security and analytics efforts across Okta, Ping, and Databricks environments.

Databricks Machine Learning
2 hours, 46 minutes ago

You're on a roll! Sign up now to keep applying.

Sign Up

Already have an account? Log in

Used by 14,729+ remote workers