We are looking for someone who has good knowledge on SIEM (System Information and event management) tools. Good understanding on Cyber Defense tools and terminologies. Can read and understand logs fetched from various log sources.
Can handle assigned tickets and also handle any escalation.
Here's a more detailed look at the responsibilities and skills of an L2 SOC analyst:Core Responsibilities:Incident Handling and Response:Investigate security incidents, identify root causes, assess impact, and recommend remediation actions.Security Alert Review:Review and analyze security alerts, prioritizing and escalating incidents as needed.SIEM and EDR Tool Management:Utilize SIEM and EDR tools to monitor security events, analyze data, and respond to incidents.Process Improvement:Contribute to the development and refinement of SOC processes and procedures.Communication and Collaboration:Communicate with other SOC team members and stakeholders.Staying Current:Keep up to date with emerging security threats, vulnerabilities, and attack methodologies. Having good understanding of MITRE framework.Key Skills:Strong Analytical and Problem-SolvingSkills:
The ability to analyze complex data, identify patterns, and resolve security issues.Understanding of Security Concepts:Knowledge of network protocols, security technologies, and security principles.Experience with Security Tools:Familiarity with SIEM, EDR, cloud security and other security tools.Incident Response and Forensics:Experience in conducting incident response, analyzing logs, and performing basic forensics.Communication and Collaboration Skills:
The ability to communicate effectively, both written and verbally, and collaborate with other teams.Threat Intelligence and Vulnerability Management:Knowledge of threat intelligence sources and vulnerability management processes.Continuous Learning:A willingness to learn and stay current with emerging security threats and technologies.Applications from people with disabilities are explicitly welcome.