SOC Analyst L2

SOC Analyst L2

Full-Time 36000 - 60000 £ / year (est.) No home office possible
Go Premium
C

At a Glance

  • Tasks: Investigate security incidents and collaborate with teams to enhance security operations.
  • Company: Join a leading cybersecurity firm focused on innovation and teamwork.
  • Benefits: Attractive salary, flexible working options, and opportunities for professional growth.
  • Why this job: Make a real difference in cybersecurity while developing your skills in a dynamic environment.
  • Qualifications: 5+ years in security operations with strong incident investigation skills.
  • Other info: Engage in continuous learning and knowledge sharing with a supportive team.

The predicted salary is between 36000 - 60000 £ per year.

SOC Analyst L2/RE is an operational role, focusing on ticket quality and security incident deeper investigation and will be responsible to handle the escalated incidents from Level 1 team within SLA.

Responsibilities:

  • SOC Analyst L2 would work closely with SOC L1 team, L3 team & customer and be responsible for performing deeper analysis.
  • Interact with clients in daily calls and take responsibility for handling True Positive incidents on time.
  • Handle escalated incidents and coordinate with clients when required.
  • Work closely with Client Duty Officers on any ad-hoc operational requests.
  • Collaborate with the Exabeam, Splunk, and Log Source teams to resolve issues as needed.
  • Take appropriate action on IOCs received from clients when required.
  • Fine-tune and create new detection rules based on client requests.
  • Create and manage the Incident handling playbook, process runbooks and ad-hoc documents whenever needed.
  • Recommend finetuning for clients with logic and threshold, and possibly the query as well for the SIEM.
  • Recommend new use cases with logic and threshold, and possibly the query as well for the SIEM.
  • Provide data from Splunk/Exabeam during client audit activities.
  • Share monthly data with clients for internal IMM meetings.
  • Share top user-reported malicious emails from Abnormal Security for reward and recognition programs.
  • Prepare RCA report when required.
  • Share knowledge with other analysts in their roles and responsibilities.
  • Provide knowledge transfer to L1 such as advanced hunting techniques, guides, cheat sheets etc.

Job Requirements:

  • Minimum 5 years of experience in Security Operations.
  • Security event monitoring, alert triage, and thorough incident investigation.
  • Research and understand log sources for effective security monitoring.
  • Isolate issues, respond to incidents, and mitigate threats swiftly.
  • Adjust SIEM rules for better alert and incident specifications.
  • Optimize SIEM capabilities, aid in audit/logging, and generate timely reports.
  • Develop and maintain security operation standards, procedures, and playbooks.

SOC Analyst L2 employer: CYBERPROOF SG PTE. LIMITED

As a SOC Analyst L2 at our company, you will thrive in a dynamic and collaborative work environment that prioritises employee growth and development. We offer comprehensive training opportunities, a supportive culture that encourages knowledge sharing, and the chance to work with cutting-edge security technologies. Located in a vibrant area, our workplace fosters innovation and teamwork, making it an excellent choice for those seeking a meaningful career in cybersecurity.
C

Contact Detail:

CYBERPROOF SG PTE. LIMITED Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land SOC Analyst L2

✨Tip Number 1

Network, network, network! Get in touch with folks in the industry, especially those already working as SOC Analysts. Attend meetups or webinars, and don’t be shy to slide into DMs on LinkedIn. We all know that sometimes it’s not just what you know, but who you know!

✨Tip Number 2

Prepare for those interviews like a pro! Research common SOC Analyst scenarios and be ready to discuss how you’d handle escalated incidents or fine-tune detection rules. We recommend practising with a friend or even in front of the mirror to boost your confidence.

✨Tip Number 3

Showcase your skills! If you’ve got experience with tools like Splunk or Exabeam, make sure to highlight that in conversations. We want to see you demonstrate your knowledge of security operations and incident handling during interviews.

✨Tip Number 4

Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive about their job search. Let’s get you that SOC Analyst L2 role!

We think you need these skills to ace SOC Analyst L2

Security Operations
Incident Investigation
Ticket Quality Management
Client Interaction
Deeper Analysis
SIEM Optimization
Splunk
Exabeam
Log Source Understanding
Incident Handling Playbook Creation
Root Cause Analysis (RCA)
Threat Mitigation
Alert Triage
Knowledge Transfer
Advanced Hunting Techniques

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights your experience in security operations and incident investigation. We want to see how your skills align with the SOC Analyst L2 role, so don’t be shy about showcasing relevant projects or achievements!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about security operations and how you can contribute to our team. We love seeing enthusiasm and a clear understanding of the role.

Showcase Your Technical Skills: Mention your experience with SIEM platforms like Splunk and Exabeam, as well as any other relevant tools. We’re looking for someone who can hit the ground running, so make sure we know what you bring to the table!

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the SOC Analyst L2 position. Plus, it’s super easy!

How to prepare for a job interview at CYBERPROOF SG PTE. LIMITED

✨Know Your Tools Inside Out

Make sure you’re well-versed in the tools mentioned in the job description, like Splunk and Exabeam. Familiarise yourself with their functionalities and how they apply to incident investigation and monitoring. Being able to discuss specific use cases or experiences with these platforms will show your expertise.

✨Prepare for Scenario-Based Questions

Expect to be asked about how you would handle specific security incidents or escalated tickets. Think of examples from your past experience where you successfully managed similar situations. This will demonstrate your problem-solving skills and ability to work under pressure.

✨Understand the Importance of Communication

Since this role involves daily interactions with clients and collaboration with various teams, be ready to discuss how you’ve effectively communicated in previous roles. Highlight any experience you have in presenting findings or coordinating with different stakeholders.

✨Showcase Your Continuous Learning

The field of security operations is always evolving, so it’s crucial to show that you’re committed to staying updated. Mention any recent certifications, courses, or self-study initiatives you’ve undertaken. This will reflect your dedication to professional growth and adapting to new challenges.

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

C
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>