SOC Analyst Level 2

SOC Analyst Level 2

Full-Time 40000 - 48000 € / year (est.) No home office possible
NTT Ltd.

At a Glance

  • Tasks: Investigate and manage security incidents, providing technical guidance to junior analysts.
  • Company: Join a leading cybersecurity firm with a focus on innovation and teamwork.
  • Benefits: Flexible work options, tailored benefits, and continuous growth opportunities.
  • Other info: Work in a 24/7 SOC with excellent career progression and mentorship opportunities.
  • Why this job: Make a real impact in cybersecurity while developing your skills in a dynamic environment.
  • Qualifications: 2-4 years in IT security, SOC experience preferred, and relevant certifications.

The predicted salary is between 40000 - 48000 € per year.

The SOC Analyst (L2) plays a critical role in the detection, investigation, and management of security alerts and incidents escalated from SOC Analyst (L1) teams. The position focuses on in-depth analysis, incident validation, tactical response coordination, and continuous improvement of security monitoring and response capabilities. Operating within a 24/7 Security Operations Centre, the L2 Analyst serves as a technical escalation point for junior analysts, working closely with internal IT and security teams as well as customers to contain and remediate security incidents. The role contributes directly to improving detection quality, response efficiency, and the overall effectiveness of SOC operations.

What you will be responsible for:

  • You will investigate security alerts and events escalated from Level 1 analysts, validating and classifying activity to determine whether it represents a confirmed security incident. This includes performing detailed analysis to understand root cause, scope, impact, and attacker behaviour using SIEM platforms and supporting telemetry.
  • You will coordinate and support incident response activities in line with defined SOC and customer processes, assisting with containment, eradication, and recovery actions.
  • During high-severity or customer-impacting incidents, you will follow major incident procedures and ensure timely, accurate escalation to stakeholders.
  • You will provide technical guidance to L1 analysts during live incidents and help maintain investigation quality under pressure.
  • You will execute defined SOAR playbooks as part of incident response and provide structured feedback to improve automation, response consistency, and efficiency.
  • You will maintain awareness of SOC performance metrics and service levels, such as MTTD and MTTR, and actively contribute to improving investigation quality and response outcomes.
  • You will apply threat intelligence to investigations and alert triage, maintaining awareness of emerging threats, vulnerabilities, and attacker techniques.
  • Incident learnings and threat insights will be fed back into detection logic to continuously enhance SOC monitoring capabilities.
  • You will also contribute to the development and tuning of SOC detection use cases, ensuring alerting remains relevant, effective, and aligned to current threat activity. This includes supporting onboarding of new services, identifying detection gaps, and recommending improvements to tooling, processes, and coverage.
  • Clear and accurate documentation is a key part of the role. You will maintain investigation records, runbooks, and playbooks, produce post-incident reports for customers and internal stakeholders, and contribute to operational and service reporting.
  • You will help document and implement improvements to event and incident management processes.
  • Collaboration is essential. You will work closely with IT, security, and technical teams to resolve incidents and reduce risk, act as a mentor and escalation point for L1 analysts, and support continual service improvement by identifying recurring issues and proposing corrective actions.

Qualifications:

  • 2-4 years’ experience in the IT security industry, ideally within a SOC or NOC environment, including experience operating at SOC L1 level.
  • Relevant cybersecurity certifications desirable (e.g. GIAC, CySA+, SC-200).
  • Experience working with cloud platforms such as Microsoft Azure and/or AWS.
  • Proficiency with Microsoft Office tools, particularly Excel and Word.
  • Strong analytical thinking, sound decision-making, and the ability to remain effective during high-pressure incidents.
  • Clear, professional communication – both written and verbal – is essential.

Security & Working Requirements:

  • Eligibility for, or holding, UK SC Clearance.
  • Willingness to work within a 24/7 shift-based SOC environment, including on-call duties.
  • Full time in Birmingham, probably 4 days on, 4 days off.

Benefits:

We offer a range of tailored benefits that support your physical, emotional, and financial wellbeing. Our Learning and Development team ensures continuous growth and development opportunities for our people. Flexible work options.

SOC Analyst Level 2 employer: NTT Ltd.

As a SOC Analyst Level 2, you will thrive in a dynamic and supportive work environment that prioritises employee growth and wellbeing. Our company offers tailored benefits, including flexible work options and a dedicated Learning and Development team to foster your professional journey. Located in Birmingham, you will be part of a collaborative culture that values teamwork and innovation, ensuring that you play a vital role in enhancing our security operations while enjoying a rewarding career.

NTT Ltd.

Contact Detail:

NTT Ltd. Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land SOC Analyst Level 2

Tip Number 1

Network like a pro! Reach out to folks in the industry, attend meetups, and connect with current SOC analysts on LinkedIn. You never know who might have the inside scoop on job openings or can refer you directly.

Tip Number 2

Show off your skills! Create a portfolio or a blog where you share your insights on security incidents, analysis techniques, or even your thoughts on emerging threats. This not only showcases your expertise but also demonstrates your passion for the field.

Tip Number 3

Prepare for interviews by brushing up on common SOC scenarios and incident response strategies. Practice articulating your thought process during high-pressure situations, as this will highlight your analytical thinking and decision-making skills.

Tip Number 4

Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive about their job search!

We think you need these skills to ace SOC Analyst Level 2

Incident Investigation
Security Alert Validation
Tactical Response Coordination
SIEM Platforms
Root Cause Analysis
Incident Response
SOAR Playbooks

Some tips for your application 🫡

Tailor Your CV:Make sure your CV highlights relevant experience in IT security, especially any SOC or NOC roles. We want to see how your skills align with the responsibilities of a SOC Analyst (L2), so don’t hold back on showcasing your analytical thinking and decision-making abilities!

Craft a Compelling Cover Letter:Your cover letter is your chance to shine! Use it to explain why you’re passionate about cybersecurity and how your background makes you a great fit for our team. We love seeing enthusiasm and a clear understanding of the role, so let your personality come through.

Showcase Your Certifications:If you’ve got any relevant cybersecurity certifications like GIAC or CySA+, make sure they’re front and centre in your application. We value continuous learning and development, so highlighting these will show us you’re committed to growing in the field.

Apply Through Our Website:We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, you’ll find all the details about the role and our company culture there, which can help you tailor your application even more!

How to prepare for a job interview at NTT Ltd.

Know Your Stuff

Make sure you brush up on your technical knowledge, especially around SIEM platforms and incident response procedures. Be ready to discuss specific incidents you've handled in the past and how you approached them.

Showcase Your Analytical Skills

Prepare to demonstrate your analytical thinking during the interview. You might be asked to solve a hypothetical security incident, so practice articulating your thought process clearly and logically.

Communicate Clearly

Since clear communication is key in this role, practice explaining complex concepts in simple terms. This will show that you can effectively communicate with both technical teams and non-technical stakeholders.

Be Ready for Scenario Questions

Expect scenario-based questions that test your decision-making under pressure. Think of examples where you had to coordinate responses or mentor junior analysts, and be prepared to discuss what you learned from those experiences.